General

  • Target

    e84b8788d7153df4963d17e2d9a8bee5_JaffaCakes118

  • Size

    248KB

  • Sample

    240918-em6apssdqq

  • MD5

    e84b8788d7153df4963d17e2d9a8bee5

  • SHA1

    de721485398c7a7337588f8b42712da1c8d783ad

  • SHA256

    7abb8d680c424ada4f25d37d299d0ebabcf85ad961fc11f3500ed4f624eb9a34

  • SHA512

    9ee9e230ff6510bb70daafbb57f0acf9fa092b50137293a08a45e24fc17c07770b40d035d82f1849c0bfef3f7c4a80751184b412118e8ca58b5b8a23df0d335c

  • SSDEEP

    6144:XGdAzfNp5UHS8cxrI6mLnHwd6NePdPp4PPPPPPPPPPundL9EtSWcz8P4R6PyPPP9:XaIFpOHSfxxmLnHM59E2RV

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e84b8788d7153df4963d17e2d9a8bee5_JaffaCakes118

    • Size

      248KB

    • MD5

      e84b8788d7153df4963d17e2d9a8bee5

    • SHA1

      de721485398c7a7337588f8b42712da1c8d783ad

    • SHA256

      7abb8d680c424ada4f25d37d299d0ebabcf85ad961fc11f3500ed4f624eb9a34

    • SHA512

      9ee9e230ff6510bb70daafbb57f0acf9fa092b50137293a08a45e24fc17c07770b40d035d82f1849c0bfef3f7c4a80751184b412118e8ca58b5b8a23df0d335c

    • SSDEEP

      6144:XGdAzfNp5UHS8cxrI6mLnHwd6NePdPp4PPPPPPPPPPundL9EtSWcz8P4R6PyPPP9:XaIFpOHSfxxmLnHM59E2RV

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks