General

  • Target

    4ba53e756edb70c888f4f3e415e90914_JaffaCakes118

  • Size

    524KB

  • Sample

    240715-174s9svcjd

  • MD5

    4ba53e756edb70c888f4f3e415e90914

  • SHA1

    394f8fbf85f4186381a44c16a1b4200516382c7c

  • SHA256

    35eb0b22d409ea214f76107850d192d30d2c67e6509caa07cfb8ec221c95d21f

  • SHA512

    9be73a5a88f6ae4eb8cc9d744cff6918247002e55f115e62b3a91931fc42da5a5ef86cad3c746cf3e909c8832e824a87d4a3f80c0a058d2acb1ae070e5f505b3

  • SSDEEP

    12288:2SFMFpuhRp8tmnkX4C4IosE/rSkU19Zt/kMM22:RF+u+gkX3o1jSkErM2

Score
10/10

Malware Config

Targets

    • Target

      4ba53e756edb70c888f4f3e415e90914_JaffaCakes118

    • Size

      524KB

    • MD5

      4ba53e756edb70c888f4f3e415e90914

    • SHA1

      394f8fbf85f4186381a44c16a1b4200516382c7c

    • SHA256

      35eb0b22d409ea214f76107850d192d30d2c67e6509caa07cfb8ec221c95d21f

    • SHA512

      9be73a5a88f6ae4eb8cc9d744cff6918247002e55f115e62b3a91931fc42da5a5ef86cad3c746cf3e909c8832e824a87d4a3f80c0a058d2acb1ae070e5f505b3

    • SSDEEP

      12288:2SFMFpuhRp8tmnkX4C4IosE/rSkU19Zt/kMM22:RF+u+gkX3o1jSkErM2

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks