General

  • Target

    4764d2c9b663b534da23b77224252de8_JaffaCakes118

  • Size

    556KB

  • Sample

    240715-ajldxaygjj

  • MD5

    4764d2c9b663b534da23b77224252de8

  • SHA1

    fb60b6495c3da07fba6c692e3951f0f22569ad0b

  • SHA256

    5a4c837ca73cf7dd7d9116fffaa632ab9f8e6f0e0d6419787c728f7c9ef1625b

  • SHA512

    9924774b8a6b49091acae0196004b34629fc6eb2580013bf7c2ea60a45150f1728e32f64f442929bf0dd2f2a9c63cbfb42a6aff090335d475199f4355297a61f

  • SSDEEP

    12288:Y7Lo8Rs90X41cnOOWB2KpyYK4BVqZDx2mpmHPW9GROsI8w:Y7L1yMgcnOds44Fp2PWUDI8

Malware Config

Targets

    • Target

      4764d2c9b663b534da23b77224252de8_JaffaCakes118

    • Size

      556KB

    • MD5

      4764d2c9b663b534da23b77224252de8

    • SHA1

      fb60b6495c3da07fba6c692e3951f0f22569ad0b

    • SHA256

      5a4c837ca73cf7dd7d9116fffaa632ab9f8e6f0e0d6419787c728f7c9ef1625b

    • SHA512

      9924774b8a6b49091acae0196004b34629fc6eb2580013bf7c2ea60a45150f1728e32f64f442929bf0dd2f2a9c63cbfb42a6aff090335d475199f4355297a61f

    • SSDEEP

      12288:Y7Lo8Rs90X41cnOOWB2KpyYK4BVqZDx2mpmHPW9GROsI8w:Y7L1yMgcnOds44Fp2PWUDI8

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks