General

  • Target

    102a7b34f973efc62c949c8d2cf9dd1c_JaffaCakes118

  • Size

    4.2MB

  • Sample

    241003-xpjtlavekf

  • MD5

    102a7b34f973efc62c949c8d2cf9dd1c

  • SHA1

    c7ff3e0977eebae2a032f737aecc009259d38f05

  • SHA256

    e896a2b43f0d4d145fea08eeb03e33c8fe71978f76981767aba4bb2c03f009d3

  • SHA512

    e86aa8b2b4d383f3ad673ad66324be7d4529144f99db49299c95744bd248383542bc8470059ac8d6cf3aa67e692d04d2e209c651b1a5b4943a94465339ad51ea

  • SSDEEP

    98304:pmvqyceFn8TbiqlAl0daHY7DZM2Aob77KZrcHl0hrDgusMbS6X:m/ce1Um9Gb7DmobugF0h3guPbjX

Malware Config

Targets

    • Target

      102a7b34f973efc62c949c8d2cf9dd1c_JaffaCakes118

    • Size

      4.2MB

    • MD5

      102a7b34f973efc62c949c8d2cf9dd1c

    • SHA1

      c7ff3e0977eebae2a032f737aecc009259d38f05

    • SHA256

      e896a2b43f0d4d145fea08eeb03e33c8fe71978f76981767aba4bb2c03f009d3

    • SHA512

      e86aa8b2b4d383f3ad673ad66324be7d4529144f99db49299c95744bd248383542bc8470059ac8d6cf3aa67e692d04d2e209c651b1a5b4943a94465339ad51ea

    • SSDEEP

      98304:pmvqyceFn8TbiqlAl0daHY7DZM2Aob77KZrcHl0hrDgusMbS6X:m/ce1Um9Gb7DmobugF0h3guPbjX

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks