General

  • Target

    b8c280f8f0dec8881261bd479786f641_JaffaCakes118

  • Size

    438KB

  • Sample

    240822-xmh5aavfpj

  • MD5

    b8c280f8f0dec8881261bd479786f641

  • SHA1

    5fd055bc0304ddb5028c1c1d67ff55b8a1fc1d28

  • SHA256

    db49e4ae7efbdd60c73db07241fbfe43770295fb862862ef046bb33e8b7c7675

  • SHA512

    4d147a477ec71a1422fbf4809c41c300a2f81b1528d0caf7fc5846ef3e7a499b4045c3af75f2452c40962836bb7accaf1b9ebb53dec2b65465ff203cfb1fb7ed

  • SSDEEP

    6144:DTOh4r+tQuHZITGEeiZbSBKHE9V4WBr14zTX/kPR8iRq1uE+VIvr:DFr+tQu0GEeiZb51IqDsJ8iRIuECIvr

Malware Config

Targets

    • Target

      b8c280f8f0dec8881261bd479786f641_JaffaCakes118

    • Size

      438KB

    • MD5

      b8c280f8f0dec8881261bd479786f641

    • SHA1

      5fd055bc0304ddb5028c1c1d67ff55b8a1fc1d28

    • SHA256

      db49e4ae7efbdd60c73db07241fbfe43770295fb862862ef046bb33e8b7c7675

    • SHA512

      4d147a477ec71a1422fbf4809c41c300a2f81b1528d0caf7fc5846ef3e7a499b4045c3af75f2452c40962836bb7accaf1b9ebb53dec2b65465ff203cfb1fb7ed

    • SSDEEP

      6144:DTOh4r+tQuHZITGEeiZbSBKHE9V4WBr14zTX/kPR8iRq1uE+VIvr:DFr+tQu0GEeiZb51IqDsJ8iRIuECIvr

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks