General

  • Target

    6f272ab41c9c85ba9466e7ca0b5fff14_JaffaCakes118

  • Size

    564KB

  • Sample

    240725-l8kdpasfqk

  • MD5

    6f272ab41c9c85ba9466e7ca0b5fff14

  • SHA1

    25a4bb5d4197d08715fa30a297c373b380782bb1

  • SHA256

    9b6af7fd35e9efc89f682890a76cc530aacabea33a1b80627bc7d6778669dfe6

  • SHA512

    8904a0a1b708399d8c0e72dacfcd28c242fd3620e1a58268585ae4fa71f95442ee0a6400ae8f00c3a6c5a91733d247e9e9df3e3592cf4aa0edbc29c813986db0

  • SSDEEP

    12288:+iEPVIq0TcwMi7tBNMLpJVeVvsZWILqY02JwwA1x33GwTuIj+w:+iRq0TcwvypSVvsfLNzJwwAkX

Malware Config

Targets

    • Target

      6f272ab41c9c85ba9466e7ca0b5fff14_JaffaCakes118

    • Size

      564KB

    • MD5

      6f272ab41c9c85ba9466e7ca0b5fff14

    • SHA1

      25a4bb5d4197d08715fa30a297c373b380782bb1

    • SHA256

      9b6af7fd35e9efc89f682890a76cc530aacabea33a1b80627bc7d6778669dfe6

    • SHA512

      8904a0a1b708399d8c0e72dacfcd28c242fd3620e1a58268585ae4fa71f95442ee0a6400ae8f00c3a6c5a91733d247e9e9df3e3592cf4aa0edbc29c813986db0

    • SSDEEP

      12288:+iEPVIq0TcwMi7tBNMLpJVeVvsZWILqY02JwwA1x33GwTuIj+w:+iRq0TcwvypSVvsfLNzJwwAkX

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks