General

  • Target

    eeb69150b3638eaccfcb813a73e1d96a_JaffaCakes118

  • Size

    484KB

  • Sample

    240921-aj8jfawdrr

  • MD5

    eeb69150b3638eaccfcb813a73e1d96a

  • SHA1

    ec679dd60d4bf98fded42e2bab1c332a35fc66ac

  • SHA256

    1a9f1aca4450bc87896768a88e8df473a21a70fef8816152695cbe4971de5c86

  • SHA512

    80401963eea507bd26cf65004c150e7640827fa726f69d1958d4b6f13dd7e499f106e4bfb464ec5cc2f85610db724dde4e9207b11509f99eb231f68d207fb94c

  • SSDEEP

    12288:wP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:wPoBHch+uudKNffiv1aVSaPTeO

Malware Config

Targets

    • Target

      eeb69150b3638eaccfcb813a73e1d96a_JaffaCakes118

    • Size

      484KB

    • MD5

      eeb69150b3638eaccfcb813a73e1d96a

    • SHA1

      ec679dd60d4bf98fded42e2bab1c332a35fc66ac

    • SHA256

      1a9f1aca4450bc87896768a88e8df473a21a70fef8816152695cbe4971de5c86

    • SHA512

      80401963eea507bd26cf65004c150e7640827fa726f69d1958d4b6f13dd7e499f106e4bfb464ec5cc2f85610db724dde4e9207b11509f99eb231f68d207fb94c

    • SSDEEP

      12288:wP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:wPoBHch+uudKNffiv1aVSaPTeO

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks