General

  • Target

    a1e3e153655de317ef8464a8b9b7ac88_JaffaCakes118

  • Size

    978KB

  • Sample

    240817-knmsmsxbjf

  • MD5

    a1e3e153655de317ef8464a8b9b7ac88

  • SHA1

    d666a1abae98ee87b7ff2aac1835ee37705427cb

  • SHA256

    7e5f6c4223fbda1592fa3aa78d8b6c3b9e3d393999c61c0721609dded2cde494

  • SHA512

    d0e10b27a2d9ea22df36face8318b83c53479b56beb0406d20cd94c8583b3fd15929a184c04730201fba42cc496ca1654f924c549316de73e1af9593e7d77bd7

  • SSDEEP

    24576:OlY9HsymIbmJO6eSzKnlV6cbsRG6ELOGf3:O+MyyGSGlVFDh3v

Malware Config

Targets

    • Target

      a1e3e153655de317ef8464a8b9b7ac88_JaffaCakes118

    • Size

      978KB

    • MD5

      a1e3e153655de317ef8464a8b9b7ac88

    • SHA1

      d666a1abae98ee87b7ff2aac1835ee37705427cb

    • SHA256

      7e5f6c4223fbda1592fa3aa78d8b6c3b9e3d393999c61c0721609dded2cde494

    • SHA512

      d0e10b27a2d9ea22df36face8318b83c53479b56beb0406d20cd94c8583b3fd15929a184c04730201fba42cc496ca1654f924c549316de73e1af9593e7d77bd7

    • SSDEEP

      24576:OlY9HsymIbmJO6eSzKnlV6cbsRG6ELOGf3:O+MyyGSGlVFDh3v

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks