Resubmissions

25/07/2024, 15:00

240725-sdp41svenm 1

25/07/2024, 14:52

240725-r8qhlaxfng 10

25/07/2024, 14:49

240725-r7fl1axerb 1

General

  • Target

    7009b84a343a1b082ff1102d8defb594_JaffaCakes118

  • Size

    30KB

  • Sample

    240725-r8qhlaxfng

  • MD5

    7009b84a343a1b082ff1102d8defb594

  • SHA1

    8f6b0196cb07de0cc254282d972752f7c39d7bea

  • SHA256

    58d5de414be03c7b9027386326355f1f49c1771ffc096098f03c24e2dd6f9272

  • SHA512

    abed1f6853fa674ccc0eaf9695b6300420f0826f3b156b75d37da7a69eadad7480bca2ce1bbc75f3d868547b705ebc05b143fcc2df094aaa9f21497cfadf8eda

  • SSDEEP

    192:3S0/qqy2ojjFHAEYLYUxH6yG50/LBWntQn6J9wzUuHJuowgwPOAEw59:3S0/volHAN0yHnG5Yo2D+vEK

Malware Config

Targets

    • Target

      7009b84a343a1b082ff1102d8defb594_JaffaCakes118

    • Size

      30KB

    • MD5

      7009b84a343a1b082ff1102d8defb594

    • SHA1

      8f6b0196cb07de0cc254282d972752f7c39d7bea

    • SHA256

      58d5de414be03c7b9027386326355f1f49c1771ffc096098f03c24e2dd6f9272

    • SHA512

      abed1f6853fa674ccc0eaf9695b6300420f0826f3b156b75d37da7a69eadad7480bca2ce1bbc75f3d868547b705ebc05b143fcc2df094aaa9f21497cfadf8eda

    • SSDEEP

      192:3S0/qqy2ojjFHAEYLYUxH6yG50/LBWntQn6J9wzUuHJuowgwPOAEw59:3S0/volHAN0yHnG5Yo2D+vEK

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks