General

  • Target

    aa0ecbc484369e6e4a10a21dcc79f25b_JaffaCakes118

  • Size

    144KB

  • Sample

    240819-hxeghszgra

  • MD5

    aa0ecbc484369e6e4a10a21dcc79f25b

  • SHA1

    940595e2ab6ecfcf3748e3d66e6684638abc33e9

  • SHA256

    4070f51e35a33de6cf038977ba52ea4dec2e90cc2e2b68b2f039844480420130

  • SHA512

    b854dd739498849a6f2cdaab85818d568ea4057ba1b903fd464cb04a6c89773f2b5ee1b065a2eb2f0a37762259b566190f32d9e41de88a2b662c619757db6350

  • SSDEEP

    3072:6x+6El0zDRluZdYRH5KfdtUeo1UIjJmCksfZhjFy1b:6x+6ElQmHYGzU/rEKfz

Malware Config

Targets

    • Target

      aa0ecbc484369e6e4a10a21dcc79f25b_JaffaCakes118

    • Size

      144KB

    • MD5

      aa0ecbc484369e6e4a10a21dcc79f25b

    • SHA1

      940595e2ab6ecfcf3748e3d66e6684638abc33e9

    • SHA256

      4070f51e35a33de6cf038977ba52ea4dec2e90cc2e2b68b2f039844480420130

    • SHA512

      b854dd739498849a6f2cdaab85818d568ea4057ba1b903fd464cb04a6c89773f2b5ee1b065a2eb2f0a37762259b566190f32d9e41de88a2b662c619757db6350

    • SSDEEP

      3072:6x+6El0zDRluZdYRH5KfdtUeo1UIjJmCksfZhjFy1b:6x+6ElQmHYGzU/rEKfz

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks