General

  • Target

    6373c5ce6b23e9b40c8f5c35620160f3_JaffaCakes118

  • Size

    368KB

  • Sample

    240722-rbrz6asbjk

  • MD5

    6373c5ce6b23e9b40c8f5c35620160f3

  • SHA1

    51fc3d32046dfb1b57a916503b6f80e1c688fb11

  • SHA256

    0a61f36de086ca2f117ede62133917d5889d7c4b0642ee234bcdbe621b934c27

  • SHA512

    f35361d048af77bfad13766a8af1e1351d183ebb555c94c0c97ef4b0c175fbba4bc51493ced994516f071559cf0ebefa02a1b0f1f5189e2c880e2ddf52ffcfa6

  • SSDEEP

    6144:/s2W1fP41l3uWBpaMU/sEOSdFoWby3/XwpbCSRk/SIpybzcdMxiElUY:/nAP4b3hBpahoKFotIpbli61i+

Malware Config

Targets

    • Target

      6373c5ce6b23e9b40c8f5c35620160f3_JaffaCakes118

    • Size

      368KB

    • MD5

      6373c5ce6b23e9b40c8f5c35620160f3

    • SHA1

      51fc3d32046dfb1b57a916503b6f80e1c688fb11

    • SHA256

      0a61f36de086ca2f117ede62133917d5889d7c4b0642ee234bcdbe621b934c27

    • SHA512

      f35361d048af77bfad13766a8af1e1351d183ebb555c94c0c97ef4b0c175fbba4bc51493ced994516f071559cf0ebefa02a1b0f1f5189e2c880e2ddf52ffcfa6

    • SSDEEP

      6144:/s2W1fP41l3uWBpaMU/sEOSdFoWby3/XwpbCSRk/SIpybzcdMxiElUY:/nAP4b3hBpahoKFotIpbli61i+

    • Adds policy Run key to start application

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks