General

  • Target

    b617896c55aa7c97f91a7bcc62c3c3ea_JaffaCakes118

  • Size

    172KB

  • Sample

    240822-dfphyayeqk

  • MD5

    b617896c55aa7c97f91a7bcc62c3c3ea

  • SHA1

    252fe018613ca18c0918d853d6cad03922ba722f

  • SHA256

    2a9e80e5a19f1c666250c72c7c5e23a3963f94d7e6ae132ef1e6aacf8d0ae792

  • SHA512

    f15d9df99225ba4415d49fe9c68ab4579f075e79d200d6f59f3fc2f55892ac7c846d6f280f797db3e294b588c3a28a4551c99d72319256f38ff562ab3f4ee03b

  • SSDEEP

    3072:lhMZA4+aeZZtfMcGUVhjB3eV9znPIzGOlnESUEdpa/3iO0Ehf+:XztftGUheV9bgzHBES5dpyts

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      b617896c55aa7c97f91a7bcc62c3c3ea_JaffaCakes118

    • Size

      172KB

    • MD5

      b617896c55aa7c97f91a7bcc62c3c3ea

    • SHA1

      252fe018613ca18c0918d853d6cad03922ba722f

    • SHA256

      2a9e80e5a19f1c666250c72c7c5e23a3963f94d7e6ae132ef1e6aacf8d0ae792

    • SHA512

      f15d9df99225ba4415d49fe9c68ab4579f075e79d200d6f59f3fc2f55892ac7c846d6f280f797db3e294b588c3a28a4551c99d72319256f38ff562ab3f4ee03b

    • SSDEEP

      3072:lhMZA4+aeZZtfMcGUVhjB3eV9znPIzGOlnESUEdpa/3iO0Ehf+:XztftGUheV9bgzHBES5dpyts

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks