General

  • Target

    c2327665b9b3b67e40a1f69fc1c88b20_JaffaCakes118

  • Size

    680KB

  • Sample

    240826-d27lmssekc

  • MD5

    c2327665b9b3b67e40a1f69fc1c88b20

  • SHA1

    2efab0bdc6d095b761c379865e78ac847078e2b9

  • SHA256

    3a21180164fa3135c66bad4bea0e499b051d1f953aaff55631ea1476c711d102

  • SHA512

    41b8defa17c1174caf0fff7c179924c6b2e7f1663dccefbf4cf9ad637096c224e9dfb1785c637e71d312d9b3e2448df520b56e0bdfc019896eb4eded5aa13e9d

  • SSDEEP

    12288:2ClephVMo7IYJAB++2RrxRAjbeNC2v+clES+vYOqH:rOhKpYyB/MrxRAZMES+b+

Malware Config

Targets

    • Target

      c2327665b9b3b67e40a1f69fc1c88b20_JaffaCakes118

    • Size

      680KB

    • MD5

      c2327665b9b3b67e40a1f69fc1c88b20

    • SHA1

      2efab0bdc6d095b761c379865e78ac847078e2b9

    • SHA256

      3a21180164fa3135c66bad4bea0e499b051d1f953aaff55631ea1476c711d102

    • SHA512

      41b8defa17c1174caf0fff7c179924c6b2e7f1663dccefbf4cf9ad637096c224e9dfb1785c637e71d312d9b3e2448df520b56e0bdfc019896eb4eded5aa13e9d

    • SSDEEP

      12288:2ClephVMo7IYJAB++2RrxRAjbeNC2v+clES+vYOqH:rOhKpYyB/MrxRAZMES+b+

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies visiblity of hidden/system files in Explorer

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks