General

  • Target

    83deb500ad02b96ec214e1b457348ead_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240809-2tj3daxekd

  • MD5

    83deb500ad02b96ec214e1b457348ead

  • SHA1

    7a49e44b47769d28c537c5dfb99b8379c4f78794

  • SHA256

    30ce5e28e396925932457f0d8f58b6898d41bdb73485e2079a0b481d3917a066

  • SHA512

    653478a985f955393a65ca488ec0780040a6131545cf7015ca2555f28ef0210ea469811f4174b963ebfcfb2fc80040e41154d6b75730cec20e90523377159025

  • SSDEEP

    49152:DMqzHZZmikwLfYpuVV52AWukw0VkAR58et09g:DBZZZfYpmrwJRvt09g

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://galaint.online-secure-pay.info/?0=128&1=2&2=1&3=17&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000&12=cfjlxfcwhj&14=1

Extracted

Language
hta
Source
URLs
hta.dropper

http://online-secure-pay.info/new/?exe-id=128&sub-id=2&install-id=cfjlxfcwhj&group-name=2024-8-9_2&ip=&subject=Flash

Extracted

Language
hta
Source
URLs
hta.dropper

http://online-secure-pay.info/new/?exe-id=128&sub-id=2&install-id=cfjlxfcwhj&group-name=2024-8-9_2&ip=&subject=Flash

Targets

    • Target

      83deb500ad02b96ec214e1b457348ead_JaffaCakes118

    • Size

      2.0MB

    • MD5

      83deb500ad02b96ec214e1b457348ead

    • SHA1

      7a49e44b47769d28c537c5dfb99b8379c4f78794

    • SHA256

      30ce5e28e396925932457f0d8f58b6898d41bdb73485e2079a0b481d3917a066

    • SHA512

      653478a985f955393a65ca488ec0780040a6131545cf7015ca2555f28ef0210ea469811f4174b963ebfcfb2fc80040e41154d6b75730cec20e90523377159025

    • SSDEEP

      49152:DMqzHZZmikwLfYpuVV52AWukw0VkAR58et09g:DBZZZfYpmrwJRvt09g

    • Disables service(s)

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks