General

  • Target

    db5bd0b549a1e0dc10a0b54540c3dae8_JaffaCakes118

  • Size

    920KB

  • Sample

    240911-2qwl1axerf

  • MD5

    db5bd0b549a1e0dc10a0b54540c3dae8

  • SHA1

    8cca8b1ede8559ccf92d320ffa0981f718d3c0b9

  • SHA256

    bcedb469087380351644ae690537e78d337ab6a05cb6bf16d1ccbabad08425dd

  • SHA512

    ebb2db8856d54fba6cbf4ab8fdabb0b7fc3a305b3b75772e89a0dcc1c4fd7a0bc7e74485dcf8e39e55141483008c519fb0fd457f873319f35360a7da09282d1d

  • SSDEEP

    24576:tJXWAayET+QuawV+XTUknfiuG7weke8juowZKMnunK:WTzuaxjnsywKMnY

Malware Config

Targets

    • Target

      db5bd0b549a1e0dc10a0b54540c3dae8_JaffaCakes118

    • Size

      920KB

    • MD5

      db5bd0b549a1e0dc10a0b54540c3dae8

    • SHA1

      8cca8b1ede8559ccf92d320ffa0981f718d3c0b9

    • SHA256

      bcedb469087380351644ae690537e78d337ab6a05cb6bf16d1ccbabad08425dd

    • SHA512

      ebb2db8856d54fba6cbf4ab8fdabb0b7fc3a305b3b75772e89a0dcc1c4fd7a0bc7e74485dcf8e39e55141483008c519fb0fd457f873319f35360a7da09282d1d

    • SSDEEP

      24576:tJXWAayET+QuawV+XTUknfiuG7weke8juowZKMnunK:WTzuaxjnsywKMnY

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks