General

  • Target

    ebe9a85458831aff1273c6ac54bdf262_JaffaCakes118

  • Size

    544KB

  • Sample

    240919-wr28aasdrg

  • MD5

    ebe9a85458831aff1273c6ac54bdf262

  • SHA1

    7413b9de2356177291deaed14d8574edb0dc1216

  • SHA256

    676194ea68266d00592ce2731ceb3e9e79c87f862e40aa44efb5bd7d92552be0

  • SHA512

    eede5d09626bcd9344e338653a1c44bddadc68d51f5c5e8d1f3a78af713665190b28e892ac5a75789e83a4694b9e8f4668acccb8d2e555ddf4d86d59c60c40d0

  • SSDEEP

    12288:zQIWT/UzJW8ivxh7vHzgryd4GT1QOoJqbbEUqe9mJd/uB28Rr8O9F8/CwM:zQI+cJHiJRTHnxhUqEhe9suB2C8O9O

Malware Config

Targets

    • Target

      ebe9a85458831aff1273c6ac54bdf262_JaffaCakes118

    • Size

      544KB

    • MD5

      ebe9a85458831aff1273c6ac54bdf262

    • SHA1

      7413b9de2356177291deaed14d8574edb0dc1216

    • SHA256

      676194ea68266d00592ce2731ceb3e9e79c87f862e40aa44efb5bd7d92552be0

    • SHA512

      eede5d09626bcd9344e338653a1c44bddadc68d51f5c5e8d1f3a78af713665190b28e892ac5a75789e83a4694b9e8f4668acccb8d2e555ddf4d86d59c60c40d0

    • SSDEEP

      12288:zQIWT/UzJW8ivxh7vHzgryd4GT1QOoJqbbEUqe9mJd/uB28Rr8O9F8/CwM:zQI+cJHiJRTHnxhUqEhe9suB2C8O9O

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks