General

  • Target

    c82fb754322fe4b17758860e3502b75b_JaffaCakes118

  • Size

    127KB

  • Sample

    240829-eft9vsthpq

  • MD5

    c82fb754322fe4b17758860e3502b75b

  • SHA1

    90a4926ecb1fb2bc58d063c59c65b575fa8f7543

  • SHA256

    73f64a4af5fea6915b2bdfcd7260452604d0960c49e78d4847003a1d078db7fd

  • SHA512

    5af0f71a1321fba8dc017acbb9b444e5bd2cbc5484d7f95741db3855e4f5ab2060765e806be7730b3870e2c24db88a5975b5593a828d2cc2491bce4bd8c845cf

  • SSDEEP

    3072:96CTOsjaQAN/3UwZtxv/ib4nG6Qqw9Jx2FIRFMd:oCTOsWQuM6xv/44yq+Yy4

Malware Config

Targets

    • Target

      c82fb754322fe4b17758860e3502b75b_JaffaCakes118

    • Size

      127KB

    • MD5

      c82fb754322fe4b17758860e3502b75b

    • SHA1

      90a4926ecb1fb2bc58d063c59c65b575fa8f7543

    • SHA256

      73f64a4af5fea6915b2bdfcd7260452604d0960c49e78d4847003a1d078db7fd

    • SHA512

      5af0f71a1321fba8dc017acbb9b444e5bd2cbc5484d7f95741db3855e4f5ab2060765e806be7730b3870e2c24db88a5975b5593a828d2cc2491bce4bd8c845cf

    • SSDEEP

      3072:96CTOsjaQAN/3UwZtxv/ib4nG6Qqw9Jx2FIRFMd:oCTOsWQuM6xv/44yq+Yy4

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks