General

  • Target

    fec5b0c4e672551aa885bca7271087dd_JaffaCakes118

  • Size

    26KB

  • Sample

    240929-sdmnwsscmb

  • MD5

    fec5b0c4e672551aa885bca7271087dd

  • SHA1

    f9c51f495adf12825f7e3dbf5be1e2ad335fe03d

  • SHA256

    eb9dc72bfe286fc6577de6f8c16af8265aa504b2268e58fe4affa085de59455d

  • SHA512

    e8adb0b722e7d1bb696477130e0409fd56975b819ac5abc5e172db4d3e03b026cfc6c3e93fa9ec22e09560d8c204dedfd58be5e04aec387f18e1787ee0c73335

  • SSDEEP

    768:olRtxfnkWt+bIRQPKeVjQ5lcZ6fdUHDfXUY:uQWwbsQP9Qk4dELXJ

Malware Config

Targets

    • Target

      fec5b0c4e672551aa885bca7271087dd_JaffaCakes118

    • Size

      26KB

    • MD5

      fec5b0c4e672551aa885bca7271087dd

    • SHA1

      f9c51f495adf12825f7e3dbf5be1e2ad335fe03d

    • SHA256

      eb9dc72bfe286fc6577de6f8c16af8265aa504b2268e58fe4affa085de59455d

    • SHA512

      e8adb0b722e7d1bb696477130e0409fd56975b819ac5abc5e172db4d3e03b026cfc6c3e93fa9ec22e09560d8c204dedfd58be5e04aec387f18e1787ee0c73335

    • SSDEEP

      768:olRtxfnkWt+bIRQPKeVjQ5lcZ6fdUHDfXUY:uQWwbsQP9Qk4dELXJ

    • Event Triggered Execution: Image File Execution Options Injection

    • Sets service image path in registry

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks