General

  • Target

    6367de68dbfc67a235ea8be08ab5a7e3_JaffaCakes118

  • Size

    164KB

  • Sample

    240722-q2x4es1ekp

  • MD5

    6367de68dbfc67a235ea8be08ab5a7e3

  • SHA1

    7e43aeedf201a78b93e5afd79eb0cdbfe2e9bd38

  • SHA256

    ecceacf4d9f83a5a238eb248c383908a64c93ace2187d84e07ee28c7ed9fc628

  • SHA512

    e17669e27b1efb382a9027537eb5d92a54d404bce7fd880323e98c32cd7360589ae49c5097fda0b01a80a240d766995bec5913c1da84ddb9903394c23b7c445b

  • SSDEEP

    3072:bHwSAvpWcGbFWLDGwNlsftNX080ZhFel+D3OtS/cpeLYl6HkBmzAdCvMZO7IV5bY:bQBC550itS/cpeLYl6HkBmzAdCvMZO79

Malware Config

Targets

    • Target

      6367de68dbfc67a235ea8be08ab5a7e3_JaffaCakes118

    • Size

      164KB

    • MD5

      6367de68dbfc67a235ea8be08ab5a7e3

    • SHA1

      7e43aeedf201a78b93e5afd79eb0cdbfe2e9bd38

    • SHA256

      ecceacf4d9f83a5a238eb248c383908a64c93ace2187d84e07ee28c7ed9fc628

    • SHA512

      e17669e27b1efb382a9027537eb5d92a54d404bce7fd880323e98c32cd7360589ae49c5097fda0b01a80a240d766995bec5913c1da84ddb9903394c23b7c445b

    • SSDEEP

      3072:bHwSAvpWcGbFWLDGwNlsftNX080ZhFel+D3OtS/cpeLYl6HkBmzAdCvMZO7IV5bY:bQBC550itS/cpeLYl6HkBmzAdCvMZO79

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks