General

  • Target

    a8cd032c5990539a53a472e9eb22a7e8_JaffaCakes118

  • Size

    255KB

  • Sample

    240819-aja8yawenn

  • MD5

    a8cd032c5990539a53a472e9eb22a7e8

  • SHA1

    578ab758417604c45f825a142579b7ae7729e92d

  • SHA256

    f548d9979fa4f07d3a5a9861f2546402bac3768d81b51d970c57e1c4a78353d4

  • SHA512

    e959c99dfcf30cc6b536639ea4c2ced6ddc5cf4db24c5b98e60b47bec91a66fbce2374fd22f28306000203f118946b13813fdd6f49198d05408b99fd56ab2995

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJG:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIp

Malware Config

Targets

    • Target

      a8cd032c5990539a53a472e9eb22a7e8_JaffaCakes118

    • Size

      255KB

    • MD5

      a8cd032c5990539a53a472e9eb22a7e8

    • SHA1

      578ab758417604c45f825a142579b7ae7729e92d

    • SHA256

      f548d9979fa4f07d3a5a9861f2546402bac3768d81b51d970c57e1c4a78353d4

    • SHA512

      e959c99dfcf30cc6b536639ea4c2ced6ddc5cf4db24c5b98e60b47bec91a66fbce2374fd22f28306000203f118946b13813fdd6f49198d05408b99fd56ab2995

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJG:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIp

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks