General

  • Target

    ee6db0acd6b10cf54aa7c91dd826fe01_JaffaCakes118

  • Size

    770KB

  • Sample

    240920-zzkjzsybpr

  • MD5

    ee6db0acd6b10cf54aa7c91dd826fe01

  • SHA1

    e027c2c7d6398f832f433cf686265bcc4181189a

  • SHA256

    8980703b7fa8d38a0fd6db1aabe7cad9596f83511c658a95a92f4694ac8d6905

  • SHA512

    33a02debe9f7afecfd94e53121472acbbc0b7ca19ab9ac3fb7755903cd6f9afa89e56d8ca6525723909e020baef3af970f769b08ac22d6c4792ab81f79dd9ffd

  • SSDEEP

    12288:PsRAp41ABYgDsfxxCtVhpX10Pl46tKCtzGO7gNA+6dT0vWY9wGoC/V1pBfH+vA:PsniOutQKKkXqngNwGfVjBfH+v

Malware Config

Targets

    • Target

      ee6db0acd6b10cf54aa7c91dd826fe01_JaffaCakes118

    • Size

      770KB

    • MD5

      ee6db0acd6b10cf54aa7c91dd826fe01

    • SHA1

      e027c2c7d6398f832f433cf686265bcc4181189a

    • SHA256

      8980703b7fa8d38a0fd6db1aabe7cad9596f83511c658a95a92f4694ac8d6905

    • SHA512

      33a02debe9f7afecfd94e53121472acbbc0b7ca19ab9ac3fb7755903cd6f9afa89e56d8ca6525723909e020baef3af970f769b08ac22d6c4792ab81f79dd9ffd

    • SSDEEP

      12288:PsRAp41ABYgDsfxxCtVhpX10Pl46tKCtzGO7gNA+6dT0vWY9wGoC/V1pBfH+vA:PsniOutQKKkXqngNwGfVjBfH+v

    • Modifies security service

    • Windows security bypass

    • Disables Task Manager via registry modification

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks