General

  • Target

    70af1a0f5edd633a967b6b424409c016_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240727-ph4anaseje

  • MD5

    70af1a0f5edd633a967b6b424409c016

  • SHA1

    c0c8ddc109da87f22126b991ce9aae2a0a666aee

  • SHA256

    43d9e3dc473784bc870edcc9507f5626d222217d0e529a03107d45a570615b2f

  • SHA512

    1f64e61aee1dfe3fad44ffe56f4b82367644160547dcdebef92ebfe1d335e244650aed4326772fef1fde96cae94895b0bc82b90aa6ff4d91bc9109c9542a2609

  • SSDEEP

    12288:xCTPgrnZiJiAaMVkUet7EwBI+APutDrVkP+xnXOBI+AM0u53XC1t:xCTPMAzVkUetVI5ut/VkP+x6IS0u53et

Malware Config

Targets

    • Target

      70af1a0f5edd633a967b6b424409c016_JaffaCakes118

    • Size

      1.2MB

    • MD5

      70af1a0f5edd633a967b6b424409c016

    • SHA1

      c0c8ddc109da87f22126b991ce9aae2a0a666aee

    • SHA256

      43d9e3dc473784bc870edcc9507f5626d222217d0e529a03107d45a570615b2f

    • SHA512

      1f64e61aee1dfe3fad44ffe56f4b82367644160547dcdebef92ebfe1d335e244650aed4326772fef1fde96cae94895b0bc82b90aa6ff4d91bc9109c9542a2609

    • SSDEEP

      12288:xCTPgrnZiJiAaMVkUet7EwBI+APutDrVkP+xnXOBI+AM0u53XC1t:xCTPMAzVkUetVI5ut/VkP+x6IS0u53et

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks