General

  • Target

    09117f8a0579f0360e04899d6608a375_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240624-rvffgawhnh

  • MD5

    09117f8a0579f0360e04899d6608a375

  • SHA1

    8a3a9ab7a0ef4f4529dfb58c459dd9d8da343dc9

  • SHA256

    dc17d7238cf0cca2c3e237d675a71ef5fe413ec0e5d915d90f3df00abaa0ec00

  • SHA512

    f78b4fd5849de680a2f40f217dff006ae7c4b05c6472d193283f1297627f03c24e63758b930ce81999cc789707253c27736962399f5921e2b70bf3f3733267bd

  • SSDEEP

    1536:0DK8Fef+IvWruJx46wshHY62pB1oAl718qn+oEywcDn6TNLsLEnouy8:0Dy+IvWylpIB7lxjn7wq6xwL0out

Malware Config

Targets

    • Target

      09117f8a0579f0360e04899d6608a375_JaffaCakes118

    • Size

      2.6MB

    • MD5

      09117f8a0579f0360e04899d6608a375

    • SHA1

      8a3a9ab7a0ef4f4529dfb58c459dd9d8da343dc9

    • SHA256

      dc17d7238cf0cca2c3e237d675a71ef5fe413ec0e5d915d90f3df00abaa0ec00

    • SHA512

      f78b4fd5849de680a2f40f217dff006ae7c4b05c6472d193283f1297627f03c24e63758b930ce81999cc789707253c27736962399f5921e2b70bf3f3733267bd

    • SSDEEP

      1536:0DK8Fef+IvWruJx46wshHY62pB1oAl718qn+oEywcDn6TNLsLEnouy8:0Dy+IvWylpIB7lxjn7wq6xwL0out

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks