General

  • Target

    13f735d68f90da0698413b3157c4428d_JaffaCakes118

  • Size

    1.2MB

  • Sample

    241004-s6rtbawgrg

  • MD5

    13f735d68f90da0698413b3157c4428d

  • SHA1

    926d661dcff7df5a9faa109188283c60c8e303a4

  • SHA256

    d8be370a81a4b4c726bdf1eb619ebce7b596d07415c77ab154cadeb7cffde1e6

  • SHA512

    f32a2e083679cc154a7c5c892881724e7e575cf6af5f5c68290cffd1f6ae06025447f273d10434d4491afb5ee12137fa2893b80c939977dd4b2c619410849d28

  • SSDEEP

    3072:RgDAWPCZabC3YUKRmjlItUj6CU5jwaaHw7Koj4rR:qD+8tUimjlIUja

Malware Config

Targets

    • Target

      13f735d68f90da0698413b3157c4428d_JaffaCakes118

    • Size

      1.2MB

    • MD5

      13f735d68f90da0698413b3157c4428d

    • SHA1

      926d661dcff7df5a9faa109188283c60c8e303a4

    • SHA256

      d8be370a81a4b4c726bdf1eb619ebce7b596d07415c77ab154cadeb7cffde1e6

    • SHA512

      f32a2e083679cc154a7c5c892881724e7e575cf6af5f5c68290cffd1f6ae06025447f273d10434d4491afb5ee12137fa2893b80c939977dd4b2c619410849d28

    • SSDEEP

      3072:RgDAWPCZabC3YUKRmjlItUj6CU5jwaaHw7Koj4rR:qD+8tUimjlIUja

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks