General

  • Target

    8922ccd2987086babb0033a61ff1d202_JaffaCakes118

  • Size

    27KB

  • Sample

    240811-fylk4s1amc

  • MD5

    8922ccd2987086babb0033a61ff1d202

  • SHA1

    760e277a42df7e857f4bfbb59ae101eb9bd62633

  • SHA256

    2f0bfff5dacbdb062addd536fe95080618616313a6fce7abbda12c4cbf559a38

  • SHA512

    feed11179b74b0ed195a970651e18a9f95f10736936934ef840bd7375c083961ba649b6bce51d8b5cd81d64790b6d41419b2ee8400298d3c2f61825297d93a88

  • SSDEEP

    768:l9O3wkhWuwElqH+ghjqf8LvZIbeA2RMC5nV:l9Ol3RBggMvee

Malware Config

Targets

    • Target

      8922ccd2987086babb0033a61ff1d202_JaffaCakes118

    • Size

      27KB

    • MD5

      8922ccd2987086babb0033a61ff1d202

    • SHA1

      760e277a42df7e857f4bfbb59ae101eb9bd62633

    • SHA256

      2f0bfff5dacbdb062addd536fe95080618616313a6fce7abbda12c4cbf559a38

    • SHA512

      feed11179b74b0ed195a970651e18a9f95f10736936934ef840bd7375c083961ba649b6bce51d8b5cd81d64790b6d41419b2ee8400298d3c2f61825297d93a88

    • SSDEEP

      768:l9O3wkhWuwElqH+ghjqf8LvZIbeA2RMC5nV:l9Ol3RBggMvee

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks