General

  • Target

    1c248f5d577400a5a8b67ba064700130_JaffaCakes118

  • Size

    544KB

  • Sample

    240701-xpmkgsxgrr

  • MD5

    1c248f5d577400a5a8b67ba064700130

  • SHA1

    715d320b8cb717d95e35c7d8cfeb4a20e53ab57b

  • SHA256

    c3a0c3e21bb0c177bf25b59bd84cf9276cdd049de86402376beee2ec1b13c985

  • SHA512

    53b4c23173b88308d991b33cb205a892657470ad7f53fcf6169823e769d0b46915c105a6da3bba9bbfb7eaebf50a885892fc45f6d1e0c86890d60653cec5e27e

  • SSDEEP

    12288:0QIWT/UzJW8ivxh7vHzgryd4GT1QOoJqbbEUqe9mJd/uB28Rr8O9F8/CwM:0QI+cJHiJRTHnxhUqEhe9suB2C8O9O

Score
10/10

Malware Config

Targets

    • Target

      1c248f5d577400a5a8b67ba064700130_JaffaCakes118

    • Size

      544KB

    • MD5

      1c248f5d577400a5a8b67ba064700130

    • SHA1

      715d320b8cb717d95e35c7d8cfeb4a20e53ab57b

    • SHA256

      c3a0c3e21bb0c177bf25b59bd84cf9276cdd049de86402376beee2ec1b13c985

    • SHA512

      53b4c23173b88308d991b33cb205a892657470ad7f53fcf6169823e769d0b46915c105a6da3bba9bbfb7eaebf50a885892fc45f6d1e0c86890d60653cec5e27e

    • SSDEEP

      12288:0QIWT/UzJW8ivxh7vHzgryd4GT1QOoJqbbEUqe9mJd/uB28Rr8O9F8/CwM:0QI+cJHiJRTHnxhUqEhe9suB2C8O9O

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks