General

  • Target

    3f0885339ffaebc1d166c526d4925c20_JaffaCakes118

  • Size

    500KB

  • Sample

    240712-1vlf6athmd

  • MD5

    3f0885339ffaebc1d166c526d4925c20

  • SHA1

    029d23cba09333965133ca0afd89d7258f80e1e0

  • SHA256

    e8ce440f6b99f056819811ad4711ba4827d6d60cb69eea5ec831ef1ca88b93ab

  • SHA512

    143acc2347ef700d7b247d2d0706aeffd204f7e6fe9139f4db451bfdcce33b93fd7b8544733090e5328ae7f711d7af024e0d9d6d8701f2e3f1b284fab77c406f

  • SSDEEP

    6144:vhj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrion5p:vR6onxOp8FySpE5zvIdtU+Ymef

Malware Config

Targets

    • Target

      3f0885339ffaebc1d166c526d4925c20_JaffaCakes118

    • Size

      500KB

    • MD5

      3f0885339ffaebc1d166c526d4925c20

    • SHA1

      029d23cba09333965133ca0afd89d7258f80e1e0

    • SHA256

      e8ce440f6b99f056819811ad4711ba4827d6d60cb69eea5ec831ef1ca88b93ab

    • SHA512

      143acc2347ef700d7b247d2d0706aeffd204f7e6fe9139f4db451bfdcce33b93fd7b8544733090e5328ae7f711d7af024e0d9d6d8701f2e3f1b284fab77c406f

    • SSDEEP

      6144:vhj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrion5p:vR6onxOp8FySpE5zvIdtU+Ymef

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks