General

  • Target

    feb4a1e95f3ac74c6e7a3b85a7a11834_JaffaCakes118

  • Size

    2.1MB

  • Sample

    240929-rm3wssxfjl

  • MD5

    feb4a1e95f3ac74c6e7a3b85a7a11834

  • SHA1

    fca4199e3320a006453d16bb8ac105354d6581ff

  • SHA256

    4192d1084d9dd28e293bdce815592fa71c8722d9c91083b8c8c9b8cfec061d49

  • SHA512

    854fd8be770ec36243f7349cc1210364a3d7d941e23cdaa4316808bdc965bddcc000f6f7971e8fc116fd54b6912f62ea5b220f717e1b1dd28f0db2bd9290eb35

  • SSDEEP

    49152:D2q3civpMQ9OFnvQNNSNuknmQo6O1g5XcvCt6CfKppWOM:DrciveQ9OFnv+4N1A6O16rcvpxM

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://galaint.coolsecupdate.info/?0=154&1=1&2=1&3=40&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000&12=hedphpnjnr&14=1

Targets

    • Target

      feb4a1e95f3ac74c6e7a3b85a7a11834_JaffaCakes118

    • Size

      2.1MB

    • MD5

      feb4a1e95f3ac74c6e7a3b85a7a11834

    • SHA1

      fca4199e3320a006453d16bb8ac105354d6581ff

    • SHA256

      4192d1084d9dd28e293bdce815592fa71c8722d9c91083b8c8c9b8cfec061d49

    • SHA512

      854fd8be770ec36243f7349cc1210364a3d7d941e23cdaa4316808bdc965bddcc000f6f7971e8fc116fd54b6912f62ea5b220f717e1b1dd28f0db2bd9290eb35

    • SSDEEP

      49152:D2q3civpMQ9OFnvQNNSNuknmQo6O1g5XcvCt6CfKppWOM:DrciveQ9OFnv+4N1A6O16rcvpxM

    • Disables service(s)

    • UAC bypass

    • Disables taskbar notifications via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks