General

  • Target

    ee040da2a70d55fe834aef39a1e9b5fe_JaffaCakes118

  • Size

    521KB

  • Sample

    240920-vaaahaxbml

  • MD5

    ee040da2a70d55fe834aef39a1e9b5fe

  • SHA1

    89c58f9551967b285bef959171beefeba18d0434

  • SHA256

    5d074ed65f62d5dbfafe0d9014a2720319bf75963cfd4c4165926825fa5c67b5

  • SHA512

    8eb53cbd29a548fc592706fb664e977ce322ef3c92f7f531b49aabc4c12862cad0c8cd512f71e1c802bdc01fe75ac4bca2c38257d3803d571f0b781f78753867

  • SSDEEP

    12288:k6/DdQHroPTAwpwXQsBPTeoG0HhDtdC2Cp4JSErXDx1jHWjrLolXVhDe:z7WsPkA8QsBPyoG0HBrC2zJSKDnHWjXb

Malware Config

Targets

    • Target

      ee040da2a70d55fe834aef39a1e9b5fe_JaffaCakes118

    • Size

      521KB

    • MD5

      ee040da2a70d55fe834aef39a1e9b5fe

    • SHA1

      89c58f9551967b285bef959171beefeba18d0434

    • SHA256

      5d074ed65f62d5dbfafe0d9014a2720319bf75963cfd4c4165926825fa5c67b5

    • SHA512

      8eb53cbd29a548fc592706fb664e977ce322ef3c92f7f531b49aabc4c12862cad0c8cd512f71e1c802bdc01fe75ac4bca2c38257d3803d571f0b781f78753867

    • SSDEEP

      12288:k6/DdQHroPTAwpwXQsBPTeoG0HhDtdC2Cp4JSErXDx1jHWjrLolXVhDe:z7WsPkA8QsBPyoG0HBrC2zJSKDnHWjXb

    • Modifies WinLogon for persistence

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks