General

  • Target

    041800142b1f43111e20ddfef3715391_JaffaCakes118

  • Size

    442KB

  • Sample

    241001-c9sl1sxajj

  • MD5

    041800142b1f43111e20ddfef3715391

  • SHA1

    cec996da944baeaf39f5e68b808178f1cba71836

  • SHA256

    dacf0554fc983754d51d1877490016407b3dde8a89fb1b461854ef2cdf65e5ff

  • SHA512

    38f415c8b0cabf726837613c2ee7fb0dea205883078be0d206e34c3722ba195f4f74c24dc72dcdb321138cf0075b677fa977c84a443d5157e9acccdc87d890e5

  • SSDEEP

    6144:5ZunObR8sVImcyYC5JJusn3L6KvXwXe3OZaxpr4IjCjPqlbYZFfW552z5c3Xjbxj:WK+mzViO3O4xpTjCbq9Yrd5k/dIkRnjL

Malware Config

Targets

    • Target

      041800142b1f43111e20ddfef3715391_JaffaCakes118

    • Size

      442KB

    • MD5

      041800142b1f43111e20ddfef3715391

    • SHA1

      cec996da944baeaf39f5e68b808178f1cba71836

    • SHA256

      dacf0554fc983754d51d1877490016407b3dde8a89fb1b461854ef2cdf65e5ff

    • SHA512

      38f415c8b0cabf726837613c2ee7fb0dea205883078be0d206e34c3722ba195f4f74c24dc72dcdb321138cf0075b677fa977c84a443d5157e9acccdc87d890e5

    • SSDEEP

      6144:5ZunObR8sVImcyYC5JJusn3L6KvXwXe3OZaxpr4IjCjPqlbYZFfW552z5c3Xjbxj:WK+mzViO3O4xpTjCbq9Yrd5k/dIkRnjL

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks