General

  • Target

    ee7ad97ff666f7dc075d8ab8fa872a13_JaffaCakes118

  • Size

    651KB

  • Sample

    240920-1lvngazejj

  • MD5

    ee7ad97ff666f7dc075d8ab8fa872a13

  • SHA1

    274a5e901753a7666038f4edf16b7e6ab79d715e

  • SHA256

    de2ce7cc8dcd6b72c327e8357b6a79405643bfe309dbaf7aee6e443b0c29e0b2

  • SHA512

    435030e0981a235d8239f254b8b4941e38e8e47a215e29c9afa6a705c8539669be9b32017c03716ad5954a5d8eace10a97213916556391f3a41935ecaef4894b

  • SSDEEP

    12288:/rigeFAg0mNM/cu/TXEl0z40I7tDH4kZmWN35iHUBe/pqLkpuzOSj:/kF2uMU6TU040+mWl0HUBe/ALnbj

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ee7ad97ff666f7dc075d8ab8fa872a13_JaffaCakes118

    • Size

      651KB

    • MD5

      ee7ad97ff666f7dc075d8ab8fa872a13

    • SHA1

      274a5e901753a7666038f4edf16b7e6ab79d715e

    • SHA256

      de2ce7cc8dcd6b72c327e8357b6a79405643bfe309dbaf7aee6e443b0c29e0b2

    • SHA512

      435030e0981a235d8239f254b8b4941e38e8e47a215e29c9afa6a705c8539669be9b32017c03716ad5954a5d8eace10a97213916556391f3a41935ecaef4894b

    • SSDEEP

      12288:/rigeFAg0mNM/cu/TXEl0z40I7tDH4kZmWN35iHUBe/pqLkpuzOSj:/kF2uMU6TU040+mWl0HUBe/ALnbj

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies WinLogon for persistence

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks