General

  • Target

    d4f46f3757d03eb21f21b00ff27e475b_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240908-ww3plsseqe

  • MD5

    d4f46f3757d03eb21f21b00ff27e475b

  • SHA1

    1eada9e3ed08e012bd5a4f6cc84aa1a19b727989

  • SHA256

    7f0e3ae00951dc81b9546edd388e0f39357edbeb080a46333e8ba19c4c4fbee5

  • SHA512

    fb3e5319bb5f7e145aa62734be4d1d2c69d2215386598aaf659d9ab7a5df9cdaed5e3d1d401e95836cd1dbf2a387d9b06b9ee62551fcdd915459309cb0fae40a

  • SSDEEP

    24576:TBha8a9X2bamZR7ErHQ2+9637HwQqiy0CuR5DB40X+MXJuEBRwqcs2hvpKX:TO8aTImH3863TwQqhZM9lvcQzBX

Malware Config

Targets

    • Target

      d4f46f3757d03eb21f21b00ff27e475b_JaffaCakes118

    • Size

      1.3MB

    • MD5

      d4f46f3757d03eb21f21b00ff27e475b

    • SHA1

      1eada9e3ed08e012bd5a4f6cc84aa1a19b727989

    • SHA256

      7f0e3ae00951dc81b9546edd388e0f39357edbeb080a46333e8ba19c4c4fbee5

    • SHA512

      fb3e5319bb5f7e145aa62734be4d1d2c69d2215386598aaf659d9ab7a5df9cdaed5e3d1d401e95836cd1dbf2a387d9b06b9ee62551fcdd915459309cb0fae40a

    • SSDEEP

      24576:TBha8a9X2bamZR7ErHQ2+9637HwQqiy0CuR5DB40X+MXJuEBRwqcs2hvpKX:TO8aTImH3863TwQqhZM9lvcQzBX

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks