General

  • Target

    ee09f0f7e4c3c501896a54bef3d3b09a_JaffaCakes118

  • Size

    544KB

  • Sample

    240920-vjgqyaxfjk

  • MD5

    ee09f0f7e4c3c501896a54bef3d3b09a

  • SHA1

    4d901a7813ee6cb0676efee350c1b73f5b08b2b7

  • SHA256

    4960493f8f9729af6e5e7119f95aafcbfd5dd6db88d7d5a4a16c6e5833e201ff

  • SHA512

    6a007d826ac096ba4282d1a249846a79d0da36fc1ce3ca48a03ae0cd32375beef06562582d48fd5c9241a41ffba7d4e67a8919c79332ad0a27ded22aff45e441

  • SSDEEP

    12288:5QIWT/UzJW8ivxh7vHzgryd4GT1QOoJqbbEUqe9mJd/uB28Rr8O9F8/CwM:5QI+cJHiJRTHnxhUqEhe9suB2C8O9O

Malware Config

Targets

    • Target

      ee09f0f7e4c3c501896a54bef3d3b09a_JaffaCakes118

    • Size

      544KB

    • MD5

      ee09f0f7e4c3c501896a54bef3d3b09a

    • SHA1

      4d901a7813ee6cb0676efee350c1b73f5b08b2b7

    • SHA256

      4960493f8f9729af6e5e7119f95aafcbfd5dd6db88d7d5a4a16c6e5833e201ff

    • SHA512

      6a007d826ac096ba4282d1a249846a79d0da36fc1ce3ca48a03ae0cd32375beef06562582d48fd5c9241a41ffba7d4e67a8919c79332ad0a27ded22aff45e441

    • SSDEEP

      12288:5QIWT/UzJW8ivxh7vHzgryd4GT1QOoJqbbEUqe9mJd/uB28Rr8O9F8/CwM:5QI+cJHiJRTHnxhUqEhe9suB2C8O9O

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks