General

  • Target

    41723e4f46d2d582de90d858df5c96f4_JaffaCakes118

  • Size

    584KB

  • Sample

    240713-ndt1raycqq

  • MD5

    41723e4f46d2d582de90d858df5c96f4

  • SHA1

    23ade8a3855e751323ce09f24c4698918c5e33b7

  • SHA256

    7766a98d86aa7b180e0f1c786dbe0f44bd65d74f2f975fa02cbbcc25bbfe4702

  • SHA512

    49dda7da248d9995357db57cd6eb35a3b1228c9ddc61cc8086556b6a95b1c7d0e7063ddb45fa3474ef4baef5494a0eff7f1c75bfca62ee7d63ea5dc141487ca4

  • SSDEEP

    12288:JQMFG+2gef5x/xQTB2OfDKC7Wgc/MXmi9pGHNu4B2U+:JQj+29VgfDnKE8I4r+

Malware Config

Targets

    • Target

      41723e4f46d2d582de90d858df5c96f4_JaffaCakes118

    • Size

      584KB

    • MD5

      41723e4f46d2d582de90d858df5c96f4

    • SHA1

      23ade8a3855e751323ce09f24c4698918c5e33b7

    • SHA256

      7766a98d86aa7b180e0f1c786dbe0f44bd65d74f2f975fa02cbbcc25bbfe4702

    • SHA512

      49dda7da248d9995357db57cd6eb35a3b1228c9ddc61cc8086556b6a95b1c7d0e7063ddb45fa3474ef4baef5494a0eff7f1c75bfca62ee7d63ea5dc141487ca4

    • SSDEEP

      12288:JQMFG+2gef5x/xQTB2OfDKC7Wgc/MXmi9pGHNu4B2U+:JQj+29VgfDnKE8I4r+

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks