General

  • Target

    ea7910ae29ced592fc59a387a139e143_JaffaCakes118

  • Size

    305KB

  • Sample

    240919-dnjmnayamj

  • MD5

    ea7910ae29ced592fc59a387a139e143

  • SHA1

    a8c90663c76d6967f2b4810fd81a42aac977d5be

  • SHA256

    ff28c02309cb561eee67921951ac347683c54d469ebebc5d1ea75dea5169cf3c

  • SHA512

    844de6bcdefd7db06409dc7fe6daa45f02ff45820d2b71c19c3f753ba6e2a589c819103ae930f051ab9f3a864c8255645040f22992eceedc61c85ddeefaa9d19

  • SSDEEP

    6144:b/Ze2jL5YYlbb087oYB3rWTjfc39qcjR8SpvK4:dDL59Nb08XNr8jMLRZ

Malware Config

Targets

    • Target

      ea7910ae29ced592fc59a387a139e143_JaffaCakes118

    • Size

      305KB

    • MD5

      ea7910ae29ced592fc59a387a139e143

    • SHA1

      a8c90663c76d6967f2b4810fd81a42aac977d5be

    • SHA256

      ff28c02309cb561eee67921951ac347683c54d469ebebc5d1ea75dea5169cf3c

    • SHA512

      844de6bcdefd7db06409dc7fe6daa45f02ff45820d2b71c19c3f753ba6e2a589c819103ae930f051ab9f3a864c8255645040f22992eceedc61c85ddeefaa9d19

    • SSDEEP

      6144:b/Ze2jL5YYlbb087oYB3rWTjfc39qcjR8SpvK4:dDL59Nb08XNr8jMLRZ

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks