General

  • Target

    ffa745739473d73e9f17da60c65a37c7_JaffaCakes118

  • Size

    252KB

  • Sample

    240930-bkajgazemr

  • MD5

    ffa745739473d73e9f17da60c65a37c7

  • SHA1

    310273de5e45fa57484b227e35f5fe1449a4e6af

  • SHA256

    1f0e8a6ccdcbd4755d7544da2037e107349c1d41b4fa4639afb89dd8541b1e09

  • SHA512

    cbc9c8ec1ca570fbc9dc83655e9a5cb1552224d2612306811db63a5954227ca782eeaa694b4a860ebdf71e76e7d65b9807173add9ad1dca8cbeae01c9caebb7d

  • SSDEEP

    3072:VDOU+qJKjmx5YH6GGFNr/UZ5e8GQZhU8LJV+0L4RHgZy7hMFtGFKivarBoJhDi:VqUPJTFpMZ88GUG8LJV+0k7hg0FKiNJs

Malware Config

Targets

    • Target

      ffa745739473d73e9f17da60c65a37c7_JaffaCakes118

    • Size

      252KB

    • MD5

      ffa745739473d73e9f17da60c65a37c7

    • SHA1

      310273de5e45fa57484b227e35f5fe1449a4e6af

    • SHA256

      1f0e8a6ccdcbd4755d7544da2037e107349c1d41b4fa4639afb89dd8541b1e09

    • SHA512

      cbc9c8ec1ca570fbc9dc83655e9a5cb1552224d2612306811db63a5954227ca782eeaa694b4a860ebdf71e76e7d65b9807173add9ad1dca8cbeae01c9caebb7d

    • SSDEEP

      3072:VDOU+qJKjmx5YH6GGFNr/UZ5e8GQZhU8LJV+0L4RHgZy7hMFtGFKivarBoJhDi:VqUPJTFpMZ88GUG8LJV+0k7hg0FKiNJs

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks