General

  • Target

    ed9a0cbe136fb6ab59971cb92d0be0c3_JaffaCakes118

  • Size

    263KB

  • Sample

    240920-ps8ccswgma

  • MD5

    ed9a0cbe136fb6ab59971cb92d0be0c3

  • SHA1

    abe1e3e027fdfc98b1ba645f225bacc5628a2ecf

  • SHA256

    e32185db2e8d44cd5f373e040bb5add197f06e3af2acc24115be656cefcb789a

  • SHA512

    c96d88fe5a6d22f7ac4fbf1b4c5c5de95671e6d04acfa4ba905f6e7201044bac9dbd7e37656cb868057df597ccd28aa4329695e3066e1391f7ba7bed25c67a6d

  • SSDEEP

    6144:RUjodL099FsAZ8DIDFrDp02OMLknQl6uAN5b:WjodOZ8A0Kklb

Malware Config

Targets

    • Target

      ed9a0cbe136fb6ab59971cb92d0be0c3_JaffaCakes118

    • Size

      263KB

    • MD5

      ed9a0cbe136fb6ab59971cb92d0be0c3

    • SHA1

      abe1e3e027fdfc98b1ba645f225bacc5628a2ecf

    • SHA256

      e32185db2e8d44cd5f373e040bb5add197f06e3af2acc24115be656cefcb789a

    • SHA512

      c96d88fe5a6d22f7ac4fbf1b4c5c5de95671e6d04acfa4ba905f6e7201044bac9dbd7e37656cb868057df597ccd28aa4329695e3066e1391f7ba7bed25c67a6d

    • SSDEEP

      6144:RUjodL099FsAZ8DIDFrDp02OMLknQl6uAN5b:WjodOZ8A0Kklb

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (65) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks