General

  • Target

    17345d60f4aa7b73ac8d9c9be2b368a9_JaffaCakes118

  • Size

    184KB

  • Sample

    241005-lxdrrsyekl

  • MD5

    17345d60f4aa7b73ac8d9c9be2b368a9

  • SHA1

    ca5ffcd9ed39694fbc254664cb9a4820230a6222

  • SHA256

    c0889b7c4b5361072d1ae4da0fa4c5818c1eb0f3d7d5fad06a2dec4a14c8d444

  • SHA512

    dad5b903b9ce39f50a31a9eefbc45f2f527b075dbe2b09652b7825f46cde5047741c14460ade66f8f4b1b7747dc0f8f13e7f4f0186796f8b6fb1352d0cf753f0

  • SSDEEP

    3072:mq6SMixt6Dad+HIvAdZOVDbh9qZcq/IQG8JwTjzoEaL1g9uuL10UwEFaLugkcaYC:d6ixt6Dad+HIvAdZOVDbh9qZcq/IQnwr

Malware Config

Targets

    • Target

      17345d60f4aa7b73ac8d9c9be2b368a9_JaffaCakes118

    • Size

      184KB

    • MD5

      17345d60f4aa7b73ac8d9c9be2b368a9

    • SHA1

      ca5ffcd9ed39694fbc254664cb9a4820230a6222

    • SHA256

      c0889b7c4b5361072d1ae4da0fa4c5818c1eb0f3d7d5fad06a2dec4a14c8d444

    • SHA512

      dad5b903b9ce39f50a31a9eefbc45f2f527b075dbe2b09652b7825f46cde5047741c14460ade66f8f4b1b7747dc0f8f13e7f4f0186796f8b6fb1352d0cf753f0

    • SSDEEP

      3072:mq6SMixt6Dad+HIvAdZOVDbh9qZcq/IQG8JwTjzoEaL1g9uuL10UwEFaLugkcaYC:d6ixt6Dad+HIvAdZOVDbh9qZcq/IQnwr

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks