General

  • Target

    14927d008ff009c30bada8e317fd1ea2_JaffaCakes118

  • Size

    185KB

  • Sample

    240627-ecy4ms1ckd

  • MD5

    14927d008ff009c30bada8e317fd1ea2

  • SHA1

    e4e21c8b9f51946af1c0a445bc08553e23510e6f

  • SHA256

    e3812e3a415389dc3db0df9dad7a049bd9b6bd4d95381d1c070aeda351beddba

  • SHA512

    a268bd14034544c3b0a5b8475a2dcb8d900603c93639c747e19894a1504002e58d87ba7f22c5afb78a2a726530f859bd8283e23c200dd0f9ae7ed6044334be80

  • SSDEEP

    3072:e0CQaH5qyUy4ctZs3sIfHUEbDhW3jyu7H5XrkqEsC19A:UW1y5jAsqHJbDQmu7H5Y8

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      14927d008ff009c30bada8e317fd1ea2_JaffaCakes118

    • Size

      185KB

    • MD5

      14927d008ff009c30bada8e317fd1ea2

    • SHA1

      e4e21c8b9f51946af1c0a445bc08553e23510e6f

    • SHA256

      e3812e3a415389dc3db0df9dad7a049bd9b6bd4d95381d1c070aeda351beddba

    • SHA512

      a268bd14034544c3b0a5b8475a2dcb8d900603c93639c747e19894a1504002e58d87ba7f22c5afb78a2a726530f859bd8283e23c200dd0f9ae7ed6044334be80

    • SSDEEP

      3072:e0CQaH5qyUy4ctZs3sIfHUEbDhW3jyu7H5XrkqEsC19A:UW1y5jAsqHJbDQmu7H5Y8

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks