General

  • Target

    942e44a6ea388b8606ac30f3f0afadd3_JaffaCakes118

  • Size

    389KB

  • Sample

    240813-wrgxcatbkl

  • MD5

    942e44a6ea388b8606ac30f3f0afadd3

  • SHA1

    a38dc38b4ef8ae3e13454162e96dc20b80f3bae8

  • SHA256

    fa948c78a6c724f21ea3d6b0bf5f069e5080947ef02948e36cd32a37689d1cef

  • SHA512

    8ad10bf0ec73523ac04320640bb5813de0508266c686010a3c52e8dabd376f94c4bcbae12540c0c3752ab739da5d6d73338ff97f5390285ce621e7a4881f2346

  • SSDEEP

    6144:L4OopLHvvUXgznGj6SXYXK/hSdnQBzQoQn+aCP0vdZhhL0MTx9nUO28Gh:L4jbvUXdmoYLnQBzQbWPCZHBx5I8Gh

Malware Config

Targets

    • Target

      942e44a6ea388b8606ac30f3f0afadd3_JaffaCakes118

    • Size

      389KB

    • MD5

      942e44a6ea388b8606ac30f3f0afadd3

    • SHA1

      a38dc38b4ef8ae3e13454162e96dc20b80f3bae8

    • SHA256

      fa948c78a6c724f21ea3d6b0bf5f069e5080947ef02948e36cd32a37689d1cef

    • SHA512

      8ad10bf0ec73523ac04320640bb5813de0508266c686010a3c52e8dabd376f94c4bcbae12540c0c3752ab739da5d6d73338ff97f5390285ce621e7a4881f2346

    • SSDEEP

      6144:L4OopLHvvUXgznGj6SXYXK/hSdnQBzQoQn+aCP0vdZhhL0MTx9nUO28Gh:L4jbvUXdmoYLnQBzQbWPCZHBx5I8Gh

    • Modifies RDP port number used by Windows

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks