General

  • Target

    b9106d727ddb3b63f7d3f38c09c8cce3_JaffaCakes118

  • Size

    183KB

  • Sample

    240822-zc576swglf

  • MD5

    b9106d727ddb3b63f7d3f38c09c8cce3

  • SHA1

    d0c4174c241c1e3e1bf2edac1512725704d9466f

  • SHA256

    f843d958bf421582dc1239715b17a10985b3d3c3c06053f7bdd42bf4b2b90a63

  • SHA512

    5de1ea6a55bbe92ac264d599f439db248b685b8bbdcd6e9f157607dcb99f1648a40cc4e30c06dbe2cb44ed81fc4bfb3fb1d895d5db244836d94ed217b7215db5

  • SSDEEP

    3072:EamFnQYUM6m3SP2sVSdEnfWZN3cbgonk9sX1qalYuhLJNdjQVVTuP5J85Vi9iqVF:Eazq3aipalYuhoao5sQkzyg

Score
8/10

Malware Config

Targets

    • Target

      b9106d727ddb3b63f7d3f38c09c8cce3_JaffaCakes118

    • Size

      183KB

    • MD5

      b9106d727ddb3b63f7d3f38c09c8cce3

    • SHA1

      d0c4174c241c1e3e1bf2edac1512725704d9466f

    • SHA256

      f843d958bf421582dc1239715b17a10985b3d3c3c06053f7bdd42bf4b2b90a63

    • SHA512

      5de1ea6a55bbe92ac264d599f439db248b685b8bbdcd6e9f157607dcb99f1648a40cc4e30c06dbe2cb44ed81fc4bfb3fb1d895d5db244836d94ed217b7215db5

    • SSDEEP

      3072:EamFnQYUM6m3SP2sVSdEnfWZN3cbgonk9sX1qalYuhLJNdjQVVTuP5J85Vi9iqVF:Eazq3aipalYuhoao5sQkzyg

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks