General

  • Target

    7154b332b728ef3629db9316a7aa2811_JaffaCakes118

  • Size

    160KB

  • Sample

    240725-1fkajsyhka

  • MD5

    7154b332b728ef3629db9316a7aa2811

  • SHA1

    3b5f4040c8d800b58b60761263fb455995ae85a6

  • SHA256

    97804996681603ffe0366a93280881b45b4ac8922d87a318b4390b42f177ba64

  • SHA512

    372921db6a089eca3ae13ec4225038b3066e39aa75ff03bdf1d7af67765ff186eb1dc7e391467c0ff70b70bbc4997cff739f34ae2453060fff0f72242043f3fd

  • SSDEEP

    3072:9sPuaMvwBICYPLuECwbjQ9fkJCEKnBnouXl+rK+SFwwa5ftGf0iI:kIwBIrPplbU9cR6J9XqexSII

Malware Config

Targets

    • Target

      7154b332b728ef3629db9316a7aa2811_JaffaCakes118

    • Size

      160KB

    • MD5

      7154b332b728ef3629db9316a7aa2811

    • SHA1

      3b5f4040c8d800b58b60761263fb455995ae85a6

    • SHA256

      97804996681603ffe0366a93280881b45b4ac8922d87a318b4390b42f177ba64

    • SHA512

      372921db6a089eca3ae13ec4225038b3066e39aa75ff03bdf1d7af67765ff186eb1dc7e391467c0ff70b70bbc4997cff739f34ae2453060fff0f72242043f3fd

    • SSDEEP

      3072:9sPuaMvwBICYPLuECwbjQ9fkJCEKnBnouXl+rK+SFwwa5ftGf0iI:kIwBIrPplbU9cR6J9XqexSII

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Looks for VMWare Tools registry key

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks