General

  • Target

    a6408adf8c458d316b97c56ebf2afa2f_JaffaCakes118

  • Size

    338KB

  • Sample

    240818-lgm1hazfkk

  • MD5

    a6408adf8c458d316b97c56ebf2afa2f

  • SHA1

    1baf6770b3f74d223d3549d5e538657dc7df58b0

  • SHA256

    36b63c6c2fe4b5c96f529069a59b1bcf78df80467d3a43953ea3fd536ad7a17b

  • SHA512

    4beb7fa28e6950417c42b422ba512c739dcc7ca812da68379cd0019b9a91cd6eeefdab9dab56823d2b707d70042e27150bc63ca11198e57f7c185320dfa1f0a7

  • SSDEEP

    6144:/iD7JsnFYYfpEbs5vWcqmw5qYJvTXX4Od4WPitEjNcbj9KcJ/rMBt:63J6FYBQv2Tn4JSebbGt

Malware Config

Targets

    • Target

      a6408adf8c458d316b97c56ebf2afa2f_JaffaCakes118

    • Size

      338KB

    • MD5

      a6408adf8c458d316b97c56ebf2afa2f

    • SHA1

      1baf6770b3f74d223d3549d5e538657dc7df58b0

    • SHA256

      36b63c6c2fe4b5c96f529069a59b1bcf78df80467d3a43953ea3fd536ad7a17b

    • SHA512

      4beb7fa28e6950417c42b422ba512c739dcc7ca812da68379cd0019b9a91cd6eeefdab9dab56823d2b707d70042e27150bc63ca11198e57f7c185320dfa1f0a7

    • SSDEEP

      6144:/iD7JsnFYYfpEbs5vWcqmw5qYJvTXX4Od4WPitEjNcbj9KcJ/rMBt:63J6FYBQv2Tn4JSebbGt

    • Adds policy Run key to start application

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks