General

  • Target

    8612e1250468477385b1c0a0615f419b_JaffaCakes118

  • Size

    416KB

  • Sample

    240810-pssa5szbjl

  • MD5

    8612e1250468477385b1c0a0615f419b

  • SHA1

    ffd61e161a1d2a6671caa71916bcf597713858a4

  • SHA256

    5f9d8a6fe993ebdff7b266d8ee24d720fe6243381dfe7cb66ab11ee73c3563c9

  • SHA512

    41fb9ce45ff8d7c2a5bb9ac0551de7d7a0ff56137390d0d2482e4b96dd2665b7f42d58eda2a173fcbaacd59a793a1327631255dfb303ae1f64abfe5cd35397d1

  • SSDEEP

    12288:nvRFi55LuGwFJQOnAJdWkW0Ht5BmZUQeR3Sc1Vq1Ttj2WAndI:n5FivLuGGJQbXHoA3at6WQd

Malware Config

Targets

    • Target

      8612e1250468477385b1c0a0615f419b_JaffaCakes118

    • Size

      416KB

    • MD5

      8612e1250468477385b1c0a0615f419b

    • SHA1

      ffd61e161a1d2a6671caa71916bcf597713858a4

    • SHA256

      5f9d8a6fe993ebdff7b266d8ee24d720fe6243381dfe7cb66ab11ee73c3563c9

    • SHA512

      41fb9ce45ff8d7c2a5bb9ac0551de7d7a0ff56137390d0d2482e4b96dd2665b7f42d58eda2a173fcbaacd59a793a1327631255dfb303ae1f64abfe5cd35397d1

    • SSDEEP

      12288:nvRFi55LuGwFJQOnAJdWkW0Ht5BmZUQeR3Sc1Vq1Ttj2WAndI:n5FivLuGGJQbXHoA3at6WQd

    • Adds policy Run key to start application

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks