General

  • Target

    bec704fd9c74a1fa792bcc7f8952a740_JaffaCakes118

  • Size

    176KB

  • Sample

    240824-rng1qawbrr

  • MD5

    bec704fd9c74a1fa792bcc7f8952a740

  • SHA1

    9fbbc8bd8b4f7d493b5b8a86cddb106cb082d02d

  • SHA256

    317c67a7cb21efecae972b2e74d5bddaa5d19f3db0ad094b64b6225df21b2881

  • SHA512

    20a834ae27f8f81017eed7e5de40a3103d5884f205d1f18c7dba25e02a58c7aca0c742533c7ad8cb69122d0f458f54f7061e29ff00adb7c89c8a47bd9ad9d072

  • SSDEEP

    3072:DXzv+WutGMFzS7f6nc46WmiJQm7Uj6iJez3YQ+pJza2qQwyU1kADDVi4H:3L0/gCPxrJAAzIpZa2K11i4H

Malware Config

Targets

    • Target

      bec704fd9c74a1fa792bcc7f8952a740_JaffaCakes118

    • Size

      176KB

    • MD5

      bec704fd9c74a1fa792bcc7f8952a740

    • SHA1

      9fbbc8bd8b4f7d493b5b8a86cddb106cb082d02d

    • SHA256

      317c67a7cb21efecae972b2e74d5bddaa5d19f3db0ad094b64b6225df21b2881

    • SHA512

      20a834ae27f8f81017eed7e5de40a3103d5884f205d1f18c7dba25e02a58c7aca0c742533c7ad8cb69122d0f458f54f7061e29ff00adb7c89c8a47bd9ad9d072

    • SSDEEP

      3072:DXzv+WutGMFzS7f6nc46WmiJQm7Uj6iJez3YQ+pJza2qQwyU1kADDVi4H:3L0/gCPxrJAAzIpZa2K11i4H

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Looks for VMWare Tools registry key

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks