General

  • Target

    2dc58f7206505e03f0b7e567e0a4cb3a_JaffaCakes118

  • Size

    410KB

  • Sample

    240708-zrl3va1bpf

  • MD5

    2dc58f7206505e03f0b7e567e0a4cb3a

  • SHA1

    4146910d6fb8f26ea4e427152f08ba84e97896c9

  • SHA256

    3d6d3e8ea8a9fcae740aa02fe396348b76d2f78c42939cca78374a71b2c965d7

  • SHA512

    475a3612cb5d341ab64b04a750328c3726e4cff277c6aa1ca36cf4ec213cd53027db3e21b240d33b5e661eaeebb906cc3129a076704672c819c56aad0675d933

  • SSDEEP

    12288:KnNhuBoY8SorxgmA+nlvVlgBea3Olu0y+V9/2o:KPatCg7EP6sRluv+V9/l

Score
10/10

Malware Config

Targets

    • Target

      2dc58f7206505e03f0b7e567e0a4cb3a_JaffaCakes118

    • Size

      410KB

    • MD5

      2dc58f7206505e03f0b7e567e0a4cb3a

    • SHA1

      4146910d6fb8f26ea4e427152f08ba84e97896c9

    • SHA256

      3d6d3e8ea8a9fcae740aa02fe396348b76d2f78c42939cca78374a71b2c965d7

    • SHA512

      475a3612cb5d341ab64b04a750328c3726e4cff277c6aa1ca36cf4ec213cd53027db3e21b240d33b5e661eaeebb906cc3129a076704672c819c56aad0675d933

    • SSDEEP

      12288:KnNhuBoY8SorxgmA+nlvVlgBea3Olu0y+V9/2o:KPatCg7EP6sRluv+V9/l

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks