General

  • Target

    dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118

  • Size

    296KB

  • Sample

    240912-nvdp4atejh

  • MD5

    dc40396ba7a60db040dc0cc8a5f50b62

  • SHA1

    4aa7f692e7b19338932785e403bb1a798552f2fa

  • SHA256

    2115f6f9e274b823456ef662cc6b511952596e82c908738da0e2dca57d8550b0

  • SHA512

    5c8bcd36508fb95b0e048c3ebdf196a33fd30307b207dbd965dc6fddfe1568df9114172cffe637605c7cab42b58fcb713091c7f7e923dde3a1aaf4d3b4c9f28b

  • SSDEEP

    3072:j7g00jC8lIT5EDwVLRfbAfmQWJg+1R5xUxb3P0QgcsHkxw/////////////////5:Y00jC8lIKyLt8WCtx7M3cYk

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118

    • Size

      296KB

    • MD5

      dc40396ba7a60db040dc0cc8a5f50b62

    • SHA1

      4aa7f692e7b19338932785e403bb1a798552f2fa

    • SHA256

      2115f6f9e274b823456ef662cc6b511952596e82c908738da0e2dca57d8550b0

    • SHA512

      5c8bcd36508fb95b0e048c3ebdf196a33fd30307b207dbd965dc6fddfe1568df9114172cffe637605c7cab42b58fcb713091c7f7e923dde3a1aaf4d3b4c9f28b

    • SSDEEP

      3072:j7g00jC8lIT5EDwVLRfbAfmQWJg+1R5xUxb3P0QgcsHkxw/////////////////5:Y00jC8lIKyLt8WCtx7M3cYk

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks