General

  • Target

    3971a17dfe31449440d7f974e353fc55_JaffaCakes118

  • Size

    3.5MB

  • Sample

    240711-rfb5hazarl

  • MD5

    3971a17dfe31449440d7f974e353fc55

  • SHA1

    3b471ff12b6bf746624ff47169b2e63481f22be7

  • SHA256

    e184ddb99ea689aa34f6374c51b77e5bed16ef0ddf558e5ea0ff46b439fbf6cd

  • SHA512

    f0dc3b56346a9608999f7c4daa949861eb7c9a104d4fcf2a33ded5320e239c86679b5d4435f13500bfdbb3de4d06c7ed91d49bd21d966bf88d1fa914107bbe79

  • SSDEEP

    98304:BPsll0cd2I2kgozrQG1pGpl6u+dY1hfhRGeJTk:BPsbdCgz5zol63dyhO2Tk

Malware Config

Targets

    • Target

      3971a17dfe31449440d7f974e353fc55_JaffaCakes118

    • Size

      3.5MB

    • MD5

      3971a17dfe31449440d7f974e353fc55

    • SHA1

      3b471ff12b6bf746624ff47169b2e63481f22be7

    • SHA256

      e184ddb99ea689aa34f6374c51b77e5bed16ef0ddf558e5ea0ff46b439fbf6cd

    • SHA512

      f0dc3b56346a9608999f7c4daa949861eb7c9a104d4fcf2a33ded5320e239c86679b5d4435f13500bfdbb3de4d06c7ed91d49bd21d966bf88d1fa914107bbe79

    • SSDEEP

      98304:BPsll0cd2I2kgozrQG1pGpl6u+dY1hfhRGeJTk:BPsbdCgz5zol63dyhO2Tk

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Disables RegEdit via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Modifies system executable filetype association

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks