General

  • Target

    62e991a4f69d1faefd734f05fdd63901_JaffaCakes118

  • Size

    492KB

  • Sample

    240722-mrkhsstakd

  • MD5

    62e991a4f69d1faefd734f05fdd63901

  • SHA1

    6e7856d104cecca2520a32861f95676df7e47c5d

  • SHA256

    b4a0e1a5dd41d82e4956c786c60a3fc4b4c609d45e98fab11774fd0929182cd7

  • SHA512

    b88c03907c3091d758dbb1950a8fd15debdc0ab57c47a3b20c71d27943e2dde2b305456bb62c7c51746ed20a42f1fb995adcfb78994debdc092372c458dbc0c2

  • SSDEEP

    12288:xbGx+je/ygu566z3w8iiuFDnNMkP8W2aSQkGvdGebCJK83:xb1je/+X3w8Cn+kP8W8/Jx

Malware Config

Targets

    • Target

      62e991a4f69d1faefd734f05fdd63901_JaffaCakes118

    • Size

      492KB

    • MD5

      62e991a4f69d1faefd734f05fdd63901

    • SHA1

      6e7856d104cecca2520a32861f95676df7e47c5d

    • SHA256

      b4a0e1a5dd41d82e4956c786c60a3fc4b4c609d45e98fab11774fd0929182cd7

    • SHA512

      b88c03907c3091d758dbb1950a8fd15debdc0ab57c47a3b20c71d27943e2dde2b305456bb62c7c51746ed20a42f1fb995adcfb78994debdc092372c458dbc0c2

    • SSDEEP

      12288:xbGx+je/ygu566z3w8iiuFDnNMkP8W2aSQkGvdGebCJK83:xb1je/+X3w8Cn+kP8W8/Jx

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks