General

  • Target

    eeaed33e13f34e6da86847dd232a6526_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240920-3x6afsvfqb

  • MD5

    eeaed33e13f34e6da86847dd232a6526

  • SHA1

    6614477c8043ae1ea5a49decd775ef8041420c60

  • SHA256

    962a11609ff88f6b0da2799fc8045fb1851837c0e6f61069302bd704edc92e11

  • SHA512

    988955125fb029f69ed28e81a04925aeb8118b1eafd3027c0c1e17bb158accf011a11dc85fee11518e6f5805523a8cb9e35402a5df39c1693b4ba7d92db57b40

  • SSDEEP

    3072:y4LY36dyMwkE9k9a9B+DWgeKENkuPpXout:VLYDoS

Malware Config

Targets

    • Target

      eeaed33e13f34e6da86847dd232a6526_JaffaCakes118

    • Size

      1.1MB

    • MD5

      eeaed33e13f34e6da86847dd232a6526

    • SHA1

      6614477c8043ae1ea5a49decd775ef8041420c60

    • SHA256

      962a11609ff88f6b0da2799fc8045fb1851837c0e6f61069302bd704edc92e11

    • SHA512

      988955125fb029f69ed28e81a04925aeb8118b1eafd3027c0c1e17bb158accf011a11dc85fee11518e6f5805523a8cb9e35402a5df39c1693b4ba7d92db57b40

    • SSDEEP

      3072:y4LY36dyMwkE9k9a9B+DWgeKENkuPpXout:VLYDoS

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks