General

  • Target

    5b63ef15deaaa6640165e762368c1a2f_JaffaCakes118

  • Size

    824KB

  • Sample

    240719-llws7sxgjc

  • MD5

    5b63ef15deaaa6640165e762368c1a2f

  • SHA1

    d40df1fd6ba0cdc5d8fed6288ce9572068234bd5

  • SHA256

    aea7d53752fa28a2b324f0d99b78eab2fbf30bec3a4d7b99053b119845222a42

  • SHA512

    833e29f893e400ff89196ac9a7a5d14825a1e89f807f3afcabffe4272eeb774e8a5d18660df73f7b28e09d1967e1617b5dcec49f206e671ec575ddd62fecf317

  • SSDEEP

    12288:zKr3QboC9qLGKgZKe4HYpHvcbTXS73cMKmA:zQ3QbiGL8LwHsS7MMM

Malware Config

Targets

    • Target

      5b63ef15deaaa6640165e762368c1a2f_JaffaCakes118

    • Size

      824KB

    • MD5

      5b63ef15deaaa6640165e762368c1a2f

    • SHA1

      d40df1fd6ba0cdc5d8fed6288ce9572068234bd5

    • SHA256

      aea7d53752fa28a2b324f0d99b78eab2fbf30bec3a4d7b99053b119845222a42

    • SHA512

      833e29f893e400ff89196ac9a7a5d14825a1e89f807f3afcabffe4272eeb774e8a5d18660df73f7b28e09d1967e1617b5dcec49f206e671ec575ddd62fecf317

    • SSDEEP

      12288:zKr3QboC9qLGKgZKe4HYpHvcbTXS73cMKmA:zQ3QbiGL8LwHsS7MMM

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks