General

  • Target

    f60e870123284a5e7f19c31a70229149_JaffaCakes118

  • Size

    230KB

  • Sample

    240925-p4qlpazbqd

  • MD5

    f60e870123284a5e7f19c31a70229149

  • SHA1

    25be1685cfadda8f612705740e6c7fd0d8c4b7d2

  • SHA256

    a45c7e8e998da32f9694edc69d5340e194bea8f677c9eb5967e2ebb9d56bc936

  • SHA512

    05e363ab7811c933df4306d0545494aef47ef9d5e76b78445678f1a09b03d43d0c20cd8e0b3727b73587ea3f50c5f1f6c7cd531d4fec074817b697636dfbd44e

  • SSDEEP

    6144:99qhjjlKJ8S0b91trPHeZjkJt+qLduu0z1bJZf:rqhjjC5g97M4GeByX

Malware Config

Targets

    • Target

      f60e870123284a5e7f19c31a70229149_JaffaCakes118

    • Size

      230KB

    • MD5

      f60e870123284a5e7f19c31a70229149

    • SHA1

      25be1685cfadda8f612705740e6c7fd0d8c4b7d2

    • SHA256

      a45c7e8e998da32f9694edc69d5340e194bea8f677c9eb5967e2ebb9d56bc936

    • SHA512

      05e363ab7811c933df4306d0545494aef47ef9d5e76b78445678f1a09b03d43d0c20cd8e0b3727b73587ea3f50c5f1f6c7cd531d4fec074817b697636dfbd44e

    • SSDEEP

      6144:99qhjjlKJ8S0b91trPHeZjkJt+qLduu0z1bJZf:rqhjjC5g97M4GeByX

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks