General

  • Target

    d36aba9e982311c61b2d06fc96a357d2_JaffaCakes118

  • Size

    163KB

  • Sample

    240908-dv9sesvdld

  • MD5

    d36aba9e982311c61b2d06fc96a357d2

  • SHA1

    953eda57561ba81f6d51a316ab0f46c007797546

  • SHA256

    7b313230fb9758d739408f1a8604c97ed72139965973cd7572d4f3d85467878a

  • SHA512

    dc5664336e4ff811fa51f53d77fd92ce49153a4c2a96291036988e8272b68f4a6a0065b06c7958b29a0377071ad493716d4613cc431aacedc84ef78da4fa3664

  • SSDEEP

    3072:AcdhTDWKN9JuB/RVgU974KlGro2UWQRtgxC6c3ovNRdNUirqSmF7Nv5D:ACTDdZmVJ974KlGM/g46cYVWimF7hV

Malware Config

Targets

    • Target

      d36aba9e982311c61b2d06fc96a357d2_JaffaCakes118

    • Size

      163KB

    • MD5

      d36aba9e982311c61b2d06fc96a357d2

    • SHA1

      953eda57561ba81f6d51a316ab0f46c007797546

    • SHA256

      7b313230fb9758d739408f1a8604c97ed72139965973cd7572d4f3d85467878a

    • SHA512

      dc5664336e4ff811fa51f53d77fd92ce49153a4c2a96291036988e8272b68f4a6a0065b06c7958b29a0377071ad493716d4613cc431aacedc84ef78da4fa3664

    • SSDEEP

      3072:AcdhTDWKN9JuB/RVgU974KlGro2UWQRtgxC6c3ovNRdNUirqSmF7Nv5D:ACTDdZmVJ974KlGM/g46cYVWimF7hV

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks