General

  • Target

    007c5abf8c081b5c7e287dbd32d50491_JaffaCakes118

  • Size

    156KB

  • Sample

    240930-kwyvwa1cmg

  • MD5

    007c5abf8c081b5c7e287dbd32d50491

  • SHA1

    4e134ab5606e1d03edbe19b660cd85f95c49aedb

  • SHA256

    e218fbca4e52d1b39cecfcd5f9445af60a9f104dfc4984f1ac6266ba5e06cbe0

  • SHA512

    058f6f40d07144ce77e7463bf4de9041d3b5c11cec3cf63aa864a15294e3f734ca2dc0650b13e227c7598a58ee8a2a1f46002f63475a2dd739908b6a05a32494

  • SSDEEP

    3072:PBiOiZ78KMuWvKztyo5W6MhYMl1FQ6CfVr8Sl0BdQ1izKA:Plu8K0AtyoYEMLUt0BdQ1id

Malware Config

Targets

    • Target

      007c5abf8c081b5c7e287dbd32d50491_JaffaCakes118

    • Size

      156KB

    • MD5

      007c5abf8c081b5c7e287dbd32d50491

    • SHA1

      4e134ab5606e1d03edbe19b660cd85f95c49aedb

    • SHA256

      e218fbca4e52d1b39cecfcd5f9445af60a9f104dfc4984f1ac6266ba5e06cbe0

    • SHA512

      058f6f40d07144ce77e7463bf4de9041d3b5c11cec3cf63aa864a15294e3f734ca2dc0650b13e227c7598a58ee8a2a1f46002f63475a2dd739908b6a05a32494

    • SSDEEP

      3072:PBiOiZ78KMuWvKztyo5W6MhYMl1FQ6CfVr8Sl0BdQ1izKA:Plu8K0AtyoYEMLUt0BdQ1id

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks