General

  • Target

    eeeff91c80c874a15cec2c4cc68e5587_JaffaCakes118

  • Size

    636KB

  • Sample

    240921-dby7ks1hkf

  • MD5

    eeeff91c80c874a15cec2c4cc68e5587

  • SHA1

    321aa0a799136832f23ad43c27cd60db540b2623

  • SHA256

    dd673bf12478240e13e74fdb025929d396a306deac934b41dab8eb3cde2a223e

  • SHA512

    6af340efd4e9bb7ef151016f1905503540f42591e9a5ecf0056f4a45b9199283590f05f7c8f6b860584324ff0d65ad0d038227fa35e662a6b848d3727e2a4e2a

  • SSDEEP

    12288:jLkcoxg7v3qnC11ErwIhh0F4qwUgUnyI8oLqfSJzZ:3fmMv6Ckr7MnyI8o6SJF

Malware Config

Targets

    • Target

      eeeff91c80c874a15cec2c4cc68e5587_JaffaCakes118

    • Size

      636KB

    • MD5

      eeeff91c80c874a15cec2c4cc68e5587

    • SHA1

      321aa0a799136832f23ad43c27cd60db540b2623

    • SHA256

      dd673bf12478240e13e74fdb025929d396a306deac934b41dab8eb3cde2a223e

    • SHA512

      6af340efd4e9bb7ef151016f1905503540f42591e9a5ecf0056f4a45b9199283590f05f7c8f6b860584324ff0d65ad0d038227fa35e662a6b848d3727e2a4e2a

    • SSDEEP

      12288:jLkcoxg7v3qnC11ErwIhh0F4qwUgUnyI8oLqfSJzZ:3fmMv6Ckr7MnyI8o6SJF

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • Network Share Discovery

      Attempt to gather information on host network.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

MITRE ATT&CK Enterprise v15

Tasks