General

  • Target

    eeefe3b9656746910979793242de3d78_JaffaCakes118

  • Size

    564KB

  • Sample

    240921-dbs1ka1hjg

  • MD5

    eeefe3b9656746910979793242de3d78

  • SHA1

    cfa7f86f0040673390d22f6cdc472b0e68cdacb3

  • SHA256

    294eddc5f6c3221e033a74b33877a95d1365e7fb2fb02f42dcd5916f96e4d835

  • SHA512

    1c17f9feca015db32a369849df76c9ba3c6e5590393d5c9e055bd5585fa80568b26ab0f27ff48aa574bc7e915a665d85c6a99c9ce30ba4095b5728279285454d

  • SSDEEP

    12288:6iEPVIq0TcwMi7tBNMLpJVeVvsZWILqY02JwwA1x33GwTuIj+w:6iRq0TcwvypSVvsfLNzJwwAkX

Malware Config

Targets

    • Target

      eeefe3b9656746910979793242de3d78_JaffaCakes118

    • Size

      564KB

    • MD5

      eeefe3b9656746910979793242de3d78

    • SHA1

      cfa7f86f0040673390d22f6cdc472b0e68cdacb3

    • SHA256

      294eddc5f6c3221e033a74b33877a95d1365e7fb2fb02f42dcd5916f96e4d835

    • SHA512

      1c17f9feca015db32a369849df76c9ba3c6e5590393d5c9e055bd5585fa80568b26ab0f27ff48aa574bc7e915a665d85c6a99c9ce30ba4095b5728279285454d

    • SSDEEP

      12288:6iEPVIq0TcwMi7tBNMLpJVeVvsZWILqY02JwwA1x33GwTuIj+w:6iRq0TcwvypSVvsfLNzJwwAkX

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks