General

  • Target

    4db32c6cb0a914e005e50275b889c86c_JaffaCakes118

  • Size

    293KB

  • Sample

    240716-lc8fmsybmc

  • MD5

    4db32c6cb0a914e005e50275b889c86c

  • SHA1

    9edad9ad5448e8c54b1330dffdf059c532ca772b

  • SHA256

    3539fb956910fdbfd97692aef97a0ce11fe110ab3d42533c7c5087dec38b00b0

  • SHA512

    a9eec0ac1e13bba82795b4f310d6ccaf98c6f789f0816557354225050c1e4d3eb03912d05979a96342158cea5437ff0b9086308e9ecfc532a974215a76eef43c

  • SSDEEP

    6144:PyOBBPST0nN69fcNA/qxr11zxzkKMHwDt/gZRPdG8f1BOqixmwe0H:7BRygNQfcNA/qxr11zxzkKMHwDt/G/tC

Malware Config

Targets

    • Target

      4db32c6cb0a914e005e50275b889c86c_JaffaCakes118

    • Size

      293KB

    • MD5

      4db32c6cb0a914e005e50275b889c86c

    • SHA1

      9edad9ad5448e8c54b1330dffdf059c532ca772b

    • SHA256

      3539fb956910fdbfd97692aef97a0ce11fe110ab3d42533c7c5087dec38b00b0

    • SHA512

      a9eec0ac1e13bba82795b4f310d6ccaf98c6f789f0816557354225050c1e4d3eb03912d05979a96342158cea5437ff0b9086308e9ecfc532a974215a76eef43c

    • SSDEEP

      6144:PyOBBPST0nN69fcNA/qxr11zxzkKMHwDt/gZRPdG8f1BOqixmwe0H:7BRygNQfcNA/qxr11zxzkKMHwDt/G/tC

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (55) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks