General

  • Target

    0298d0eda7a8bbfca9dcfa0a8ad1fa6f_JaffaCakes118

  • Size

    85KB

  • Sample

    240622-rpmmla1epg

  • MD5

    0298d0eda7a8bbfca9dcfa0a8ad1fa6f

  • SHA1

    0c78da03e8d89536e6d137bc263b74b6a9a623e2

  • SHA256

    adf21ecc10cb8d7312efc5dd06d1f151f106cd696d47724f3c2b3ff9da37d25d

  • SHA512

    e104656886933faa13a84a0e2dbf05340c7e6483fdb7a993fce86f0cfbd40a12efef075fdf7e25c89a8d7327bbdb3effb8637e02aa72ab59084c9ec7848ac2c4

  • SSDEEP

    1536:4fNH5HloNrW9iX64wgbgK8EOD6XbTWUomyO1GwFHvEDcrd8EELy/Sj:4fNH8N69Lj1EBOUfb3xE4rdkmSj

Malware Config

Targets

    • Target

      0298d0eda7a8bbfca9dcfa0a8ad1fa6f_JaffaCakes118

    • Size

      85KB

    • MD5

      0298d0eda7a8bbfca9dcfa0a8ad1fa6f

    • SHA1

      0c78da03e8d89536e6d137bc263b74b6a9a623e2

    • SHA256

      adf21ecc10cb8d7312efc5dd06d1f151f106cd696d47724f3c2b3ff9da37d25d

    • SHA512

      e104656886933faa13a84a0e2dbf05340c7e6483fdb7a993fce86f0cfbd40a12efef075fdf7e25c89a8d7327bbdb3effb8637e02aa72ab59084c9ec7848ac2c4

    • SSDEEP

      1536:4fNH5HloNrW9iX64wgbgK8EOD6XbTWUomyO1GwFHvEDcrd8EELy/Sj:4fNH8N69Lj1EBOUfb3xE4rdkmSj

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

File and Directory Permissions Modification

2
T1222

Windows File and Directory Permissions Modification

1
T1222.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks