General

  • Target

    e13376dec97e28d51aa80f68b7860849_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240914-2v4s6s1gjr

  • MD5

    e13376dec97e28d51aa80f68b7860849

  • SHA1

    8a98aa1ff246723bee0d5d307ab69f20a61a1c09

  • SHA256

    dfc5874e79146257ff910942b6a7801ea92638086558ff2bb7f77d6e8209f2e3

  • SHA512

    cb5e1bb199b143c5ec5cf220c2701b0b4a07c3766fbe352440dfceefa12c105c9de668336608750b9d300a52599e8e931a36f033aeb95a2491129f5f985a97eb

  • SSDEEP

    12288:MDeq6XQ2xIjrwg8d+G6e2S5Est12EUEYO27NUvLFyImxAuTdmsi:Mn5rwgxG6TSPGEU7VqvLFyInadms

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e13376dec97e28d51aa80f68b7860849_JaffaCakes118

    • Size

      1.2MB

    • MD5

      e13376dec97e28d51aa80f68b7860849

    • SHA1

      8a98aa1ff246723bee0d5d307ab69f20a61a1c09

    • SHA256

      dfc5874e79146257ff910942b6a7801ea92638086558ff2bb7f77d6e8209f2e3

    • SHA512

      cb5e1bb199b143c5ec5cf220c2701b0b4a07c3766fbe352440dfceefa12c105c9de668336608750b9d300a52599e8e931a36f033aeb95a2491129f5f985a97eb

    • SSDEEP

      12288:MDeq6XQ2xIjrwg8d+G6e2S5Est12EUEYO27NUvLFyImxAuTdmsi:Mn5rwgxG6TSPGEU7VqvLFyInadms

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks