General

  • Target

    3cc8d9f3123b467e96e20389446f6df6_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240712-k7wvnazakg

  • MD5

    3cc8d9f3123b467e96e20389446f6df6

  • SHA1

    ca8f465a80b7a144685d6aec4bb1e463ef4560ba

  • SHA256

    42d4d05163f7215ec7f08dd805458eeb995657f00388550d73597ee79fedc7b9

  • SHA512

    2837a1ab4da588186ebceb49b5a55c654edfb3e39398b3c4ed42ace9c3e5fce91a409aa9a1921e92cd88ef824b92b252eaaef78e02ca65c47d10c49e3e6f3c8f

  • SSDEEP

    49152:Dgq1kMLzrf0SgEm8kG99Yry2cwIDa7CA6xm7I:DPBj0SJVHYryeE8Zs

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://galaint.updatesecstorage.info/?0=166&1=7&2=1&3=48&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=0000&12=chwgigwfsf&14=1

Targets

    • Target

      3cc8d9f3123b467e96e20389446f6df6_JaffaCakes118

    • Size

      1.8MB

    • MD5

      3cc8d9f3123b467e96e20389446f6df6

    • SHA1

      ca8f465a80b7a144685d6aec4bb1e463ef4560ba

    • SHA256

      42d4d05163f7215ec7f08dd805458eeb995657f00388550d73597ee79fedc7b9

    • SHA512

      2837a1ab4da588186ebceb49b5a55c654edfb3e39398b3c4ed42ace9c3e5fce91a409aa9a1921e92cd88ef824b92b252eaaef78e02ca65c47d10c49e3e6f3c8f

    • SSDEEP

      49152:Dgq1kMLzrf0SgEm8kG99Yry2cwIDa7CA6xm7I:DPBj0SJVHYryeE8Zs

    • Disables service(s)

    • UAC bypass

    • Disables taskbar notifications via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks