General

  • Target

    b752d4193922a3ec9096197fb8e0d7e9_JaffaCakes118

  • Size

    394KB

  • Sample

    240822-mremjssdka

  • MD5

    b752d4193922a3ec9096197fb8e0d7e9

  • SHA1

    481d4c852085a0cb0587c7f7ea25f1f585ee6874

  • SHA256

    8ac508426371a847235c9433c063f1696ef949f9791ab0ab121b2942b924dc14

  • SHA512

    7566a19855e0c611cd7e9bca353067e49ba3c1fa8e1f6967519a172e31c7605904345a333a222a73a9d85d27561982a1fdccd997960828ff76ab0bbc07238c58

  • SSDEEP

    6144:WknN4CVUIm6uk06ZLYgvBA+8xmrxgmA+3cclptVopAfV:7nNhuBoY8SorxgmA+nlvVlfV

Malware Config

Targets

    • Target

      b752d4193922a3ec9096197fb8e0d7e9_JaffaCakes118

    • Size

      394KB

    • MD5

      b752d4193922a3ec9096197fb8e0d7e9

    • SHA1

      481d4c852085a0cb0587c7f7ea25f1f585ee6874

    • SHA256

      8ac508426371a847235c9433c063f1696ef949f9791ab0ab121b2942b924dc14

    • SHA512

      7566a19855e0c611cd7e9bca353067e49ba3c1fa8e1f6967519a172e31c7605904345a333a222a73a9d85d27561982a1fdccd997960828ff76ab0bbc07238c58

    • SSDEEP

      6144:WknN4CVUIm6uk06ZLYgvBA+8xmrxgmA+3cclptVopAfV:7nNhuBoY8SorxgmA+nlvVlfV

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks