General

  • Target

    843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118

  • Size

    225KB

  • Sample

    240810-bcnq5ayajl

  • MD5

    843af912fff6ee44d7aaf4e9f625f509

  • SHA1

    7721563ba449f133f2592927d16c5a65da27ed19

  • SHA256

    c22c15b1fa25f120fe98f22241b86daf93addea99e92bdbb2945744b1f584d81

  • SHA512

    e1e4061e5ca54e60c9a4360f3c26aede755c0ed67e6bda998949b4eda894d14411cf65b5a2a08a0a607ce07f3df48639145ad37e3ad2c34de4636aa8efed3c65

  • SSDEEP

    6144:yNxJdew0qZfYp+cWZaKJ9VaJtPjtixbwSpMel:wJww0UfYpvi/TAPJixUSpM

Malware Config

Targets

    • Target

      843af912fff6ee44d7aaf4e9f625f509_JaffaCakes118

    • Size

      225KB

    • MD5

      843af912fff6ee44d7aaf4e9f625f509

    • SHA1

      7721563ba449f133f2592927d16c5a65da27ed19

    • SHA256

      c22c15b1fa25f120fe98f22241b86daf93addea99e92bdbb2945744b1f584d81

    • SHA512

      e1e4061e5ca54e60c9a4360f3c26aede755c0ed67e6bda998949b4eda894d14411cf65b5a2a08a0a607ce07f3df48639145ad37e3ad2c34de4636aa8efed3c65

    • SSDEEP

      6144:yNxJdew0qZfYp+cWZaKJ9VaJtPjtixbwSpMel:wJww0UfYpvi/TAPJixUSpM

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks