General

  • Target

    edfb253bb20650ad6d5e01d2b8f6d385_JaffaCakes118

  • Size

    680KB

  • Sample

    240920-twl1rawdqq

  • MD5

    edfb253bb20650ad6d5e01d2b8f6d385

  • SHA1

    542ba1671532e6d797a8877f6facfa4e7b77983b

  • SHA256

    1dbc50d081f9780db588770d2df0753b9738a89aaf2d698a364b781e2576dc43

  • SHA512

    b85739f2f5aec30ef1d02d82e0926a05c093b71f84e0c5bacabb7eefabbaefcd1647890470ffd84be7c93eca3042d94dbadef05b0b45b707316bae8e8c8dc880

  • SSDEEP

    12288:zClephVMo7IYJAB++2RrxRAjbeNC2v+clES+vYOqH:+OhKpYyB/MrxRAZMES+b+

Malware Config

Targets

    • Target

      edfb253bb20650ad6d5e01d2b8f6d385_JaffaCakes118

    • Size

      680KB

    • MD5

      edfb253bb20650ad6d5e01d2b8f6d385

    • SHA1

      542ba1671532e6d797a8877f6facfa4e7b77983b

    • SHA256

      1dbc50d081f9780db588770d2df0753b9738a89aaf2d698a364b781e2576dc43

    • SHA512

      b85739f2f5aec30ef1d02d82e0926a05c093b71f84e0c5bacabb7eefabbaefcd1647890470ffd84be7c93eca3042d94dbadef05b0b45b707316bae8e8c8dc880

    • SSDEEP

      12288:zClephVMo7IYJAB++2RrxRAjbeNC2v+clES+vYOqH:+OhKpYyB/MrxRAZMES+b+

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Drops file in Drivers directory

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks