General

  • Target

    ac6a64530424799b0a3eea734b8df658_JaffaCakes118

  • Size

    248KB

  • Sample

    240819-yy9baatdme

  • MD5

    ac6a64530424799b0a3eea734b8df658

  • SHA1

    7df10712b034a4f941c04e6953a273d48c6e7d36

  • SHA256

    a3a5461400bc261725a311033d7cb5b775e2c028ea6fa0f371c59ad5b70da48f

  • SHA512

    0976d511a2404fcbe2593974abf1a00658b7cd8fbf473bb8068c4252a81d7a2dd14579f57263021e11c81c346ccae15c898722876646b8159de0d9edb38439d4

  • SSDEEP

    3072:352m38/JCWT3HvIT4jg2ZqYJl2GIKhuHEt8p4xCeO4bVFf6q38WSE6hTjH:Qms/JHq2g2nk1KhuktT9bVJvjS9P

Malware Config

Targets

    • Target

      ac6a64530424799b0a3eea734b8df658_JaffaCakes118

    • Size

      248KB

    • MD5

      ac6a64530424799b0a3eea734b8df658

    • SHA1

      7df10712b034a4f941c04e6953a273d48c6e7d36

    • SHA256

      a3a5461400bc261725a311033d7cb5b775e2c028ea6fa0f371c59ad5b70da48f

    • SHA512

      0976d511a2404fcbe2593974abf1a00658b7cd8fbf473bb8068c4252a81d7a2dd14579f57263021e11c81c346ccae15c898722876646b8159de0d9edb38439d4

    • SSDEEP

      3072:352m38/JCWT3HvIT4jg2ZqYJl2GIKhuHEt8p4xCeO4bVFf6q38WSE6hTjH:Qms/JHq2g2nk1KhuktT9bVJvjS9P

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (57) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks