General

  • Target

    83be26d514c0a84cf8c1b66714f41aad_JaffaCakes118

  • Size

    650KB

  • Sample

    240809-13v1ka1hkl

  • MD5

    83be26d514c0a84cf8c1b66714f41aad

  • SHA1

    e9d3d9dd7e3517e981bf30253ce74fe71509ba79

  • SHA256

    23ed340ff7fe011be54a61b632e3219083b65dbbb101ab2e77e293e5e25c999d

  • SHA512

    4e83677096673c06e42e2550b08d730c4017f976f58d699858208710d3212a430a6b8e4890bedb94c810d58ce750f6c816a24d1a83d9416c874600f4e92a70bc

  • SSDEEP

    12288:QjkArEN249AyE/rbaMct4bO2/VBg3XUyXFpywR/cXhC5RABO:LFE//Tct4bOsDgJXHyPRCkBO

Malware Config

Targets

    • Target

      83be26d514c0a84cf8c1b66714f41aad_JaffaCakes118

    • Size

      650KB

    • MD5

      83be26d514c0a84cf8c1b66714f41aad

    • SHA1

      e9d3d9dd7e3517e981bf30253ce74fe71509ba79

    • SHA256

      23ed340ff7fe011be54a61b632e3219083b65dbbb101ab2e77e293e5e25c999d

    • SHA512

      4e83677096673c06e42e2550b08d730c4017f976f58d699858208710d3212a430a6b8e4890bedb94c810d58ce750f6c816a24d1a83d9416c874600f4e92a70bc

    • SSDEEP

      12288:QjkArEN249AyE/rbaMct4bO2/VBg3XUyXFpywR/cXhC5RABO:LFE//Tct4bOsDgJXHyPRCkBO

    • Modifies visiblity of hidden/system files in Explorer

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks