General

  • Target

    e683ef8b6e8160731e2fe86d49b3fd55_JaffaCakes118

  • Size

    170KB

  • Sample

    240917-lfdenswake

  • MD5

    e683ef8b6e8160731e2fe86d49b3fd55

  • SHA1

    a2a2a1e7edac0d347545799b3262422026dc9f03

  • SHA256

    b810ab4a531b213b97d8396032b96b288dcac0da883d3da4a31e1a72d45e87eb

  • SHA512

    f8a32856176de266103785528d218c2fdf1d5a6fe0a08d3f962d54d1eb6ab3d44b302fc26c6218cff6e83d208d6780d7e879754b7c74a01d07a3e792983a57ac

  • SSDEEP

    3072:P2USgYgM+Lk7u3+veXR4vWhD9tvXJBZ1w4UVyth+KGMiEcs:D9YaEuuGXR4+D931w/ythmMFcs

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e683ef8b6e8160731e2fe86d49b3fd55_JaffaCakes118

    • Size

      170KB

    • MD5

      e683ef8b6e8160731e2fe86d49b3fd55

    • SHA1

      a2a2a1e7edac0d347545799b3262422026dc9f03

    • SHA256

      b810ab4a531b213b97d8396032b96b288dcac0da883d3da4a31e1a72d45e87eb

    • SHA512

      f8a32856176de266103785528d218c2fdf1d5a6fe0a08d3f962d54d1eb6ab3d44b302fc26c6218cff6e83d208d6780d7e879754b7c74a01d07a3e792983a57ac

    • SSDEEP

      3072:P2USgYgM+Lk7u3+veXR4vWhD9tvXJBZ1w4UVyth+KGMiEcs:D9YaEuuGXR4+D931w/ythmMFcs

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks