General

  • Target

    643ae41b773497893d981126bad39c7c_JaffaCakes118

  • Size

    524KB

  • Sample

    240722-wqltxa1alk

  • MD5

    643ae41b773497893d981126bad39c7c

  • SHA1

    367f70419bcaf919c7a186cc62efde9a5cd9b5eb

  • SHA256

    c391cb4f68fc65db198cc008cc2c56d26e63c50d7701564ed2aa010c9f55b5e3

  • SHA512

    80c82be598987ef7195319d3352c2debe4a1bdb8e5a79f38f313421bb6a5579ddde2c2949d4e8782a067344ef5e51b06d9ebb0a36c7220f37acaa44ded0bc55a

  • SSDEEP

    12288:kSFMFpuhRp8tmnkX4C4IosE/rSkU19Zt/kMM22:rF+u+gkX3o1jSkErM2

Score
10/10

Malware Config

Targets

    • Target

      643ae41b773497893d981126bad39c7c_JaffaCakes118

    • Size

      524KB

    • MD5

      643ae41b773497893d981126bad39c7c

    • SHA1

      367f70419bcaf919c7a186cc62efde9a5cd9b5eb

    • SHA256

      c391cb4f68fc65db198cc008cc2c56d26e63c50d7701564ed2aa010c9f55b5e3

    • SHA512

      80c82be598987ef7195319d3352c2debe4a1bdb8e5a79f38f313421bb6a5579ddde2c2949d4e8782a067344ef5e51b06d9ebb0a36c7220f37acaa44ded0bc55a

    • SSDEEP

      12288:kSFMFpuhRp8tmnkX4C4IosE/rSkU19Zt/kMM22:rF+u+gkX3o1jSkErM2

    Score
    10/10
    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks