General

  • Target

    31f5cec3a4d078213a9837daaf392c3c_JaffaCakes118

  • Size

    4.2MB

  • Sample

    240709-ztweasvhqj

  • MD5

    31f5cec3a4d078213a9837daaf392c3c

  • SHA1

    26d29c62ed023653f89b16f757916cfcd29b61ac

  • SHA256

    57a91bc3ae18eab20229f486da34255dad9bb35c1012e5e837bbe35080de7e47

  • SHA512

    7c69a50060bf1137c950a5dbf8213260574ac93d0e570945b8753491db9b43ded79fa45fdc70ae3a5d2ee90a9dbb836f4677c678cdf749085a7a530228f50832

  • SSDEEP

    98304:n0xpuI5ymWHqc64yce1xsYKx1RxtAOwfEk0staAfz8:n0xpu6yJKc64yce1xsYKx1RxtAOYEk0F

Malware Config

Targets

    • Target

      31f5cec3a4d078213a9837daaf392c3c_JaffaCakes118

    • Size

      4.2MB

    • MD5

      31f5cec3a4d078213a9837daaf392c3c

    • SHA1

      26d29c62ed023653f89b16f757916cfcd29b61ac

    • SHA256

      57a91bc3ae18eab20229f486da34255dad9bb35c1012e5e837bbe35080de7e47

    • SHA512

      7c69a50060bf1137c950a5dbf8213260574ac93d0e570945b8753491db9b43ded79fa45fdc70ae3a5d2ee90a9dbb836f4677c678cdf749085a7a530228f50832

    • SSDEEP

      98304:n0xpuI5ymWHqc64yce1xsYKx1RxtAOwfEk0staAfz8:n0xpu6yJKc64yce1xsYKx1RxtAOYEk0F

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

MITRE ATT&CK Enterprise v15

Tasks