General

  • Target

    fa7c328ed1155f461e2907e95e71888e_JaffaCakes118

  • Size

    512KB

  • Sample

    240927-qp1nsaxbjc

  • MD5

    fa7c328ed1155f461e2907e95e71888e

  • SHA1

    f62a47454d0705212e9c84681bb68da2e8547ea4

  • SHA256

    b71dba1e942d77326b3aab54a73fdafe2e195a6e22fa73eb9ab023dfc4544b3a

  • SHA512

    30d2a24208a5bce51226f559ca4470e2bb01ca5e6360815b6243307fefddba4ef96cdc80d9d372099e2138a266b052533a71d75f4b294ae1ef7ec7a8229288cc

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj66:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm57

Malware Config

Targets

    • Target

      fa7c328ed1155f461e2907e95e71888e_JaffaCakes118

    • Size

      512KB

    • MD5

      fa7c328ed1155f461e2907e95e71888e

    • SHA1

      f62a47454d0705212e9c84681bb68da2e8547ea4

    • SHA256

      b71dba1e942d77326b3aab54a73fdafe2e195a6e22fa73eb9ab023dfc4544b3a

    • SHA512

      30d2a24208a5bce51226f559ca4470e2bb01ca5e6360815b6243307fefddba4ef96cdc80d9d372099e2138a266b052533a71d75f4b294ae1ef7ec7a8229288cc

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj66:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm57

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks