General

  • Target

    96f434fb7fd86f53ff554145d5fd2ddb_JaffaCakes118

  • Size

    968KB

  • Sample

    240814-vtzphaydqp

  • MD5

    96f434fb7fd86f53ff554145d5fd2ddb

  • SHA1

    9be1a718a60a5e7d7e016b2746ce836279893f8a

  • SHA256

    d689097e4997b7b9de6d603f2c2f7c77722079e9234aeb6a503a654d992bf765

  • SHA512

    ff38f23508beadad234b14728fc24a10a7c8e56bb85d91b3c6792807cad53c64f983d726e8e32926c2ee09e22f45b586dc357d8dc9f93901bc3d48f87d154c15

  • SSDEEP

    12288:ApUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqs:ApUNr6YkVRFkgbeqeo68Fhq

Malware Config

Targets

    • Target

      96f434fb7fd86f53ff554145d5fd2ddb_JaffaCakes118

    • Size

      968KB

    • MD5

      96f434fb7fd86f53ff554145d5fd2ddb

    • SHA1

      9be1a718a60a5e7d7e016b2746ce836279893f8a

    • SHA256

      d689097e4997b7b9de6d603f2c2f7c77722079e9234aeb6a503a654d992bf765

    • SHA512

      ff38f23508beadad234b14728fc24a10a7c8e56bb85d91b3c6792807cad53c64f983d726e8e32926c2ee09e22f45b586dc357d8dc9f93901bc3d48f87d154c15

    • SSDEEP

      12288:ApUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqs:ApUNr6YkVRFkgbeqeo68Fhq

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks