General

  • Target

    5eb6f7118d3a0ce4ef0232609f910d18_JaffaCakes118

  • Size

    952KB

  • Sample

    240720-c4vjeswdqe

  • MD5

    5eb6f7118d3a0ce4ef0232609f910d18

  • SHA1

    404adb26ba92478c26e3adfdc581ffc0d34deee8

  • SHA256

    17b941330650aceeab1a40a3c8140ef645d9a9ee40cd64bfbad433e251811efa

  • SHA512

    eabf88c11984b2a74a98367aa67dc0494608818340b760bdcd75bce1feb0a262f5c3c7f915c27c9088465fdf35ecfda35fc6f7004eb23b76534aa17fecda6a3c

  • SSDEEP

    6144:k8XXRUw9Oz5+iUU03pej1YpTYzOb0kLXhlJFTaLTGu0yvHcr+JB8aUcp:HnRy+ZyYpaCDJFuPyAHcqrU

Malware Config

Targets

    • Target

      5eb6f7118d3a0ce4ef0232609f910d18_JaffaCakes118

    • Size

      952KB

    • MD5

      5eb6f7118d3a0ce4ef0232609f910d18

    • SHA1

      404adb26ba92478c26e3adfdc581ffc0d34deee8

    • SHA256

      17b941330650aceeab1a40a3c8140ef645d9a9ee40cd64bfbad433e251811efa

    • SHA512

      eabf88c11984b2a74a98367aa67dc0494608818340b760bdcd75bce1feb0a262f5c3c7f915c27c9088465fdf35ecfda35fc6f7004eb23b76534aa17fecda6a3c

    • SSDEEP

      6144:k8XXRUw9Oz5+iUU03pej1YpTYzOb0kLXhlJFTaLTGu0yvHcr+JB8aUcp:HnRy+ZyYpaCDJFuPyAHcqrU

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks