General

  • Target

    b0a5095377c7a5c35f64ad8955d6596a_JaffaCakes118

  • Size

    255KB

  • Sample

    240820-yvqd1avcqr

  • MD5

    b0a5095377c7a5c35f64ad8955d6596a

  • SHA1

    5050cc884463bd649c1640cccc60f778a859427f

  • SHA256

    1a260e0a8e76c7d174ac9ed3760b15e78b7f1dc78a34fc5564531154532d5c5c

  • SHA512

    0cb55c96c8a87bfec5b4fcabb11b711c38dc77461708f5430019f670db4dd25e06e5c7b035d4fecd8ba19982a5f86a6dcd217b764b0c09b2d49c3ec27cd9ff3d

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJx:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIE

Malware Config

Targets

    • Target

      b0a5095377c7a5c35f64ad8955d6596a_JaffaCakes118

    • Size

      255KB

    • MD5

      b0a5095377c7a5c35f64ad8955d6596a

    • SHA1

      5050cc884463bd649c1640cccc60f778a859427f

    • SHA256

      1a260e0a8e76c7d174ac9ed3760b15e78b7f1dc78a34fc5564531154532d5c5c

    • SHA512

      0cb55c96c8a87bfec5b4fcabb11b711c38dc77461708f5430019f670db4dd25e06e5c7b035d4fecd8ba19982a5f86a6dcd217b764b0c09b2d49c3ec27cd9ff3d

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJx:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIE

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks