General

  • Target

    ee9d8d8f22f855560fcd0265295184bd_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240920-268w9stcmc

  • MD5

    ee9d8d8f22f855560fcd0265295184bd

  • SHA1

    78a971213af8c54425be74ca6ed3ebb8aa2d7507

  • SHA256

    2bafea62379670c8bd6532b28ec5b9b37f61e5977d852f593d215648a3d3ab5d

  • SHA512

    0d01a1f583f436d17574fad0e6fea6ddc4554665bcdead2eff605937166b00c686346f45a5bc8136dbe80c16d704b550331a239f5a1e71c58763a53aa73d3da4

  • SSDEEP

    49152:rGcGkHMGdPCuGjU6HMCR1Evp57SxrcMMFNZ0Bq6UufNoF7A:rGK1dyU6H1R2hx+rkFPCqAVoBA

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://galaint.onlinesecstats.info/?0=115&1=1&2=1&3=56&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000&12=lpplfcvkej&14=1

Targets

    • Target

      ee9d8d8f22f855560fcd0265295184bd_JaffaCakes118

    • Size

      2.0MB

    • MD5

      ee9d8d8f22f855560fcd0265295184bd

    • SHA1

      78a971213af8c54425be74ca6ed3ebb8aa2d7507

    • SHA256

      2bafea62379670c8bd6532b28ec5b9b37f61e5977d852f593d215648a3d3ab5d

    • SHA512

      0d01a1f583f436d17574fad0e6fea6ddc4554665bcdead2eff605937166b00c686346f45a5bc8136dbe80c16d704b550331a239f5a1e71c58763a53aa73d3da4

    • SSDEEP

      49152:rGcGkHMGdPCuGjU6HMCR1Evp57SxrcMMFNZ0Bq6UufNoF7A:rGK1dyU6H1R2hx+rkFPCqAVoBA

    • Disables service(s)

    • UAC bypass

    • Disables taskbar notifications via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks