General

  • Target

    73be789cb571f3dd9914921b226864fa_JaffaCakes118

  • Size

    29KB

  • Sample

    240726-my533stbnj

  • MD5

    73be789cb571f3dd9914921b226864fa

  • SHA1

    5ac49b649a70d55b5580ebf7121b858301643f1c

  • SHA256

    16c8a7935a1d89b333a0c28ce6f47a812cbc4dcf2d4aadf38331f0f8c3cf636c

  • SHA512

    f08879d5623820d4713179329a98681edd84e4d186d3db078df136a679bb7a5a121e1d5ee04dc47b433fc6a0d0c4ea564820f6f8dbd899fc47b79b2ca9f003fc

  • SSDEEP

    768:B2TyH2YMISjwcsIJuQPeyj5MFndnefDNkRwpFfAIc/kEf2wAf8oIK:4Ty2YMISMcPJuin2Fdne22DfHIK

Malware Config

Targets

    • Target

      73be789cb571f3dd9914921b226864fa_JaffaCakes118

    • Size

      29KB

    • MD5

      73be789cb571f3dd9914921b226864fa

    • SHA1

      5ac49b649a70d55b5580ebf7121b858301643f1c

    • SHA256

      16c8a7935a1d89b333a0c28ce6f47a812cbc4dcf2d4aadf38331f0f8c3cf636c

    • SHA512

      f08879d5623820d4713179329a98681edd84e4d186d3db078df136a679bb7a5a121e1d5ee04dc47b433fc6a0d0c4ea564820f6f8dbd899fc47b79b2ca9f003fc

    • SSDEEP

      768:B2TyH2YMISjwcsIJuQPeyj5MFndnefDNkRwpFfAIc/kEf2wAf8oIK:4Ty2YMISMcPJuin2Fdne22DfHIK

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks