General

  • Target

    eefc73d405a5502e75d52ae44e42dc8f_JaffaCakes118

  • Size

    312KB

  • Sample

    240921-d1x1tashja

  • MD5

    eefc73d405a5502e75d52ae44e42dc8f

  • SHA1

    d7546671756111d13ffff754003cea278d76d068

  • SHA256

    c1aec79c9c8856dd95697bda0fc72a429ce643948e7eade932185706adbcdb3f

  • SHA512

    94f3916016db153b9821dd0b77e2a5f91471002980cfad16ee7ef084098e929919607a834c30ecbd481aac559a20f86f82b786b93f00cc9d87ac7b90113d8b09

  • SSDEEP

    3072:i8Gc8rsQlU6hHGv7yCd6FgGOGDRgPiSWEeOr5L:ivhmDyCgFgGX2SON

Malware Config

Targets

    • Target

      eefc73d405a5502e75d52ae44e42dc8f_JaffaCakes118

    • Size

      312KB

    • MD5

      eefc73d405a5502e75d52ae44e42dc8f

    • SHA1

      d7546671756111d13ffff754003cea278d76d068

    • SHA256

      c1aec79c9c8856dd95697bda0fc72a429ce643948e7eade932185706adbcdb3f

    • SHA512

      94f3916016db153b9821dd0b77e2a5f91471002980cfad16ee7ef084098e929919607a834c30ecbd481aac559a20f86f82b786b93f00cc9d87ac7b90113d8b09

    • SSDEEP

      3072:i8Gc8rsQlU6hHGv7yCd6FgGOGDRgPiSWEeOr5L:ivhmDyCgFgGX2SON

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks