General

  • Target

    148327a59b3f1020a2f2cccc47d19dfb_JaffaCakes118

  • Size

    2.3MB

  • Sample

    241004-xbrmaazdmj

  • MD5

    148327a59b3f1020a2f2cccc47d19dfb

  • SHA1

    4bf8542cf745ab80bb8e08ad7c9effd8a918b59f

  • SHA256

    9c2c0be7f6fc2a252852d108251c01f65ccc53ad81e75235608a33db5d44a677

  • SHA512

    b6a097a5b5971cc7fedac0d9104e3a359652766bdf8df9d7d772c480cb9a595d78e0003bcca357696cf97e714056c36782e4319d859b3628ce22982aca320af0

  • SSDEEP

    49152:Y8ev4j/fTa2Nj0YRJ+tqb+U/f6pN4yhW8Chlsu4I:Bev4jX7IYRJ+C+UfShWdh/j

Malware Config

Targets

    • Target

      148327a59b3f1020a2f2cccc47d19dfb_JaffaCakes118

    • Size

      2.3MB

    • MD5

      148327a59b3f1020a2f2cccc47d19dfb

    • SHA1

      4bf8542cf745ab80bb8e08ad7c9effd8a918b59f

    • SHA256

      9c2c0be7f6fc2a252852d108251c01f65ccc53ad81e75235608a33db5d44a677

    • SHA512

      b6a097a5b5971cc7fedac0d9104e3a359652766bdf8df9d7d772c480cb9a595d78e0003bcca357696cf97e714056c36782e4319d859b3628ce22982aca320af0

    • SSDEEP

      49152:Y8ev4j/fTa2Nj0YRJ+tqb+U/f6pN4yhW8Chlsu4I:Bev4jX7IYRJ+C+UfShWdh/j

    • UAC bypass

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks