General

  • Target

    e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118

  • Size

    170KB

  • Sample

    240915-t8vtesteqp

  • MD5

    e2f02f8b5bb36a736d67d2d995a52813

  • SHA1

    cefc849ed964d317e9d9141723e4780a236a30d4

  • SHA256

    622e7bb230ad894be3cd46524732b06b98d1c37f250cca59907607fdbd53c289

  • SHA512

    d65041f0cc5323558eb5b65b4de070f4d15eac720dbb62bf611f7eb04b58704869707b94e6649cafed94fecd78c6a1457dd061967388cdc9befdc0fab73baa14

  • SSDEEP

    3072:42B6xr+t9V5vCRXx+uhZ1Qxk7bGbsw/Y7qqxPp+E5f3Eh9/Umhspe5uiahC:wka9x+CLQpcqqH+UUsmSehb

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118

    • Size

      170KB

    • MD5

      e2f02f8b5bb36a736d67d2d995a52813

    • SHA1

      cefc849ed964d317e9d9141723e4780a236a30d4

    • SHA256

      622e7bb230ad894be3cd46524732b06b98d1c37f250cca59907607fdbd53c289

    • SHA512

      d65041f0cc5323558eb5b65b4de070f4d15eac720dbb62bf611f7eb04b58704869707b94e6649cafed94fecd78c6a1457dd061967388cdc9befdc0fab73baa14

    • SSDEEP

      3072:42B6xr+t9V5vCRXx+uhZ1Qxk7bGbsw/Y7qqxPp+E5f3Eh9/Umhspe5uiahC:wka9x+CLQpcqqH+UUsmSehb

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks