General

  • Target

    d5f9fa1a8dca5319432f51a5891f7794_JaffaCakes118

  • Size

    7.1MB

  • Sample

    240909-knsnwszdmk

  • MD5

    d5f9fa1a8dca5319432f51a5891f7794

  • SHA1

    2a937328f5b99eccb9b8c13ed71d6ffb9dff4521

  • SHA256

    18f4123ee42f5a29f8df7bd1cf95ab73441f082584f390aa218c2dd1134f4055

  • SHA512

    87013b63a9b153c5268784928394dfbf1eeff1b91eea6bdf187025e63d25c535e468e59a33f47d23682a386605bb314311e50a7edd1d6deb1b60f5008237a7d0

  • SSDEEP

    196608:TfavVYaolX+aFFLlPKQ8hY/RkQWslX4ge+:TiYaolrFFEHYu3sSge

Malware Config

Targets

    • Target

      d5f9fa1a8dca5319432f51a5891f7794_JaffaCakes118

    • Size

      7.1MB

    • MD5

      d5f9fa1a8dca5319432f51a5891f7794

    • SHA1

      2a937328f5b99eccb9b8c13ed71d6ffb9dff4521

    • SHA256

      18f4123ee42f5a29f8df7bd1cf95ab73441f082584f390aa218c2dd1134f4055

    • SHA512

      87013b63a9b153c5268784928394dfbf1eeff1b91eea6bdf187025e63d25c535e468e59a33f47d23682a386605bb314311e50a7edd1d6deb1b60f5008237a7d0

    • SSDEEP

      196608:TfavVYaolX+aFFLlPKQ8hY/RkQWslX4ge+:TiYaolrFFEHYu3sSge

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Zhen Executable

    • Zhen Ransomware

      First seen in September 2020. Drops ransomnote as .ini file.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Renames multiple (1884) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • mimikatz is an open source tool to dump credentials on Windows

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks