General

  • Target

    bbaea7dbde076cc97a50befba4fb9909_JaffaCakes118

  • Size

    90KB

  • Sample

    240823-pejf3stakc

  • MD5

    bbaea7dbde076cc97a50befba4fb9909

  • SHA1

    ad879681bdbf9b286324f4851bd3b699e68a37f6

  • SHA256

    2939c242fd67c1057d531b6a6cf167653b06288b8acdcb99bb32f62e9825ccf4

  • SHA512

    abb5faa2d75667692edeb240dad2db7aa7fab260747f8204bfc2fd0c58ba12f040bc8024d0c528e2196542b771e7fe45c25b615316392da57154f316e6a4a608

  • SSDEEP

    1536:10b4datWrQaMmy1cydIq9ya9RD4piGN4CxVZZfy2IiwYb0hqCwVFH8WVGSpiliki:i3W8aO1cyeqhLcx4CxVHHIi/04TFc2pH

Malware Config

Targets

    • Target

      bbaea7dbde076cc97a50befba4fb9909_JaffaCakes118

    • Size

      90KB

    • MD5

      bbaea7dbde076cc97a50befba4fb9909

    • SHA1

      ad879681bdbf9b286324f4851bd3b699e68a37f6

    • SHA256

      2939c242fd67c1057d531b6a6cf167653b06288b8acdcb99bb32f62e9825ccf4

    • SHA512

      abb5faa2d75667692edeb240dad2db7aa7fab260747f8204bfc2fd0c58ba12f040bc8024d0c528e2196542b771e7fe45c25b615316392da57154f316e6a4a608

    • SSDEEP

      1536:10b4datWrQaMmy1cydIq9ya9RD4piGN4CxVZZfy2IiwYb0hqCwVFH8WVGSpiliki:i3W8aO1cyeqhLcx4CxVHHIi/04TFc2pH

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

MITRE ATT&CK Enterprise v15

Tasks