General

  • Target

    5b5d42cc135d07724512a6443849a20c_JaffaCakes118

  • Size

    61KB

  • Sample

    240719-lgdrtstfnl

  • MD5

    5b5d42cc135d07724512a6443849a20c

  • SHA1

    fe0a1d444494d9ef67d8a3c29fedd1d5531cc914

  • SHA256

    96f20f950ad87577aa409c0f47f2a7fb859748b35bd14684d11dcad5dfc62504

  • SHA512

    2a4d297d1ec5836a9669cecd3b13b52c7f7059d7ae44e476e5b71be976749890d722b17490291a81b84c572586f126b561b3f1faa945cedcbd322bf16cc215ad

  • SSDEEP

    1536:qX+h2ONRhV6nUWAXf6Gz+GyC8Xos9cdKrOoNRf02by9hTM:qX+h2ONRhVOGf6GCCMqZoDby9hTM

Malware Config

Targets

    • Target

      5b5d42cc135d07724512a6443849a20c_JaffaCakes118

    • Size

      61KB

    • MD5

      5b5d42cc135d07724512a6443849a20c

    • SHA1

      fe0a1d444494d9ef67d8a3c29fedd1d5531cc914

    • SHA256

      96f20f950ad87577aa409c0f47f2a7fb859748b35bd14684d11dcad5dfc62504

    • SHA512

      2a4d297d1ec5836a9669cecd3b13b52c7f7059d7ae44e476e5b71be976749890d722b17490291a81b84c572586f126b561b3f1faa945cedcbd322bf16cc215ad

    • SSDEEP

      1536:qX+h2ONRhV6nUWAXf6Gz+GyC8Xos9cdKrOoNRf02by9hTM:qX+h2ONRhVOGf6GCCMqZoDby9hTM

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks