General

  • Target

    34aea2abc2fa0973aa1531313bf34c36_JaffaCakes118

  • Size

    105KB

  • Sample

    240710-pfwssszaja

  • MD5

    34aea2abc2fa0973aa1531313bf34c36

  • SHA1

    6a13bf9c3c74fc740fa0c3ef1e69c4073f9f366f

  • SHA256

    633c748131901f08f3a299e75a2600c6ddf8cb5aa8c40ae7991c1e80d87c8867

  • SHA512

    65dbdcca32130a3bb840711197fb3a1cbad877191befa2cb6ee8186dd5cf63d267d5f2f752e39a267bc6867f0811626f56cac55e14002abb73994a6ea6a6a28f

  • SSDEEP

    3072:vgh2I2r6EHIABO7Q+Wzk8jwaaHw7Koj4r0c7:6EH7yi

Malware Config

Targets

    • Target

      34aea2abc2fa0973aa1531313bf34c36_JaffaCakes118

    • Size

      105KB

    • MD5

      34aea2abc2fa0973aa1531313bf34c36

    • SHA1

      6a13bf9c3c74fc740fa0c3ef1e69c4073f9f366f

    • SHA256

      633c748131901f08f3a299e75a2600c6ddf8cb5aa8c40ae7991c1e80d87c8867

    • SHA512

      65dbdcca32130a3bb840711197fb3a1cbad877191befa2cb6ee8186dd5cf63d267d5f2f752e39a267bc6867f0811626f56cac55e14002abb73994a6ea6a6a28f

    • SSDEEP

      3072:vgh2I2r6EHIABO7Q+Wzk8jwaaHw7Koj4r0c7:6EH7yi

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks