General

  • Target

    329c87854b586f27e35a305159a2e22e_JaffaCakes118

  • Size

    544KB

  • Sample

    240710-avcadaxbrd

  • MD5

    329c87854b586f27e35a305159a2e22e

  • SHA1

    0a18868c28758866756f69031c450fffa1428902

  • SHA256

    184df27cfadde2dabe41ef66712b7e63e00278b896e675ee3d183494aba34edc

  • SHA512

    b31c6570665b0d193d4c4ab6c4f512ee6934b71fd135da7529ee207d023878de85c2cdf5ba506b3eda619f9d8e398a940605872480b74b6d6c8a81cb4d5862d7

  • SSDEEP

    12288:DQIWT/UzJW8ivxh7vHzgryd4GT1QOoJqbbEUqe9mJd/uB28Rr8O9F8/CwM:DQI+cJHiJRTHnxhUqEhe9suB2C8O9O

Score
10/10

Malware Config

Targets

    • Target

      329c87854b586f27e35a305159a2e22e_JaffaCakes118

    • Size

      544KB

    • MD5

      329c87854b586f27e35a305159a2e22e

    • SHA1

      0a18868c28758866756f69031c450fffa1428902

    • SHA256

      184df27cfadde2dabe41ef66712b7e63e00278b896e675ee3d183494aba34edc

    • SHA512

      b31c6570665b0d193d4c4ab6c4f512ee6934b71fd135da7529ee207d023878de85c2cdf5ba506b3eda619f9d8e398a940605872480b74b6d6c8a81cb4d5862d7

    • SSDEEP

      12288:DQIWT/UzJW8ivxh7vHzgryd4GT1QOoJqbbEUqe9mJd/uB28Rr8O9F8/CwM:DQI+cJHiJRTHnxhUqEhe9suB2C8O9O

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks