General

  • Target

    ee1dfc3d1b9ce6f7e32346ba14deedf2_JaffaCakes118

  • Size

    256KB

  • Sample

    240920-wcj36ayfpb

  • MD5

    ee1dfc3d1b9ce6f7e32346ba14deedf2

  • SHA1

    2fd04a20949de3e0504279a0ff82f4e7e0996287

  • SHA256

    614a29f5665b63f40a3d8dc721513563fd9fe16bdeb922fd8840d3e17cc48cea

  • SHA512

    45f884aaffe37c9c568e92c78a5499453ff169ffcc6773f414cabcd236f27bbd2c6ad7d5879bdce5c91e16f5320bfd4cad69fb219e4021c95bb731c490ac9af2

  • SSDEEP

    6144:jIkuR0XRLUAsR+ztFKgZzQOBRhDnvGVLtqCY+YtIA:k9OXRLUAJtogZMIHDv6L0CY+Y3

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ee1dfc3d1b9ce6f7e32346ba14deedf2_JaffaCakes118

    • Size

      256KB

    • MD5

      ee1dfc3d1b9ce6f7e32346ba14deedf2

    • SHA1

      2fd04a20949de3e0504279a0ff82f4e7e0996287

    • SHA256

      614a29f5665b63f40a3d8dc721513563fd9fe16bdeb922fd8840d3e17cc48cea

    • SHA512

      45f884aaffe37c9c568e92c78a5499453ff169ffcc6773f414cabcd236f27bbd2c6ad7d5879bdce5c91e16f5320bfd4cad69fb219e4021c95bb731c490ac9af2

    • SSDEEP

      6144:jIkuR0XRLUAsR+ztFKgZzQOBRhDnvGVLtqCY+YtIA:k9OXRLUAJtogZMIHDv6L0CY+Y3

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks