General

  • Target

    2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118

  • Size

    1.9MB

  • Sample

    241009-fafpysscrc

  • MD5

    2aff6bd9dfb80c1ac34180e17ccc9c24

  • SHA1

    5a7bac87fe5ffe3c527ee3dbcd8ae7893e33f6f9

  • SHA256

    fe4a1fc042da484adda7fdacd0b007025a73df4a836da7411f6082357cdfc684

  • SHA512

    d39dbfdc84f395629fb3c179e5a57c7274068beb4d5a0f3bb838c4146544d7da18a3c8331eae2f76e9418606f101f34be1cd10a02907fa3eade16f2efe92050d

  • SSDEEP

    49152:Dm1WAZYhMLVOmCmpqb3r6d2TuScfOJSaPCUbRN59yxYc:ifZcOVOm/qrGciSQOJSaP/blkxP

Malware Config

Targets

    • Target

      2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118

    • Size

      1.9MB

    • MD5

      2aff6bd9dfb80c1ac34180e17ccc9c24

    • SHA1

      5a7bac87fe5ffe3c527ee3dbcd8ae7893e33f6f9

    • SHA256

      fe4a1fc042da484adda7fdacd0b007025a73df4a836da7411f6082357cdfc684

    • SHA512

      d39dbfdc84f395629fb3c179e5a57c7274068beb4d5a0f3bb838c4146544d7da18a3c8331eae2f76e9418606f101f34be1cd10a02907fa3eade16f2efe92050d

    • SSDEEP

      49152:Dm1WAZYhMLVOmCmpqb3r6d2TuScfOJSaPCUbRN59yxYc:ifZcOVOm/qrGciSQOJSaP/blkxP

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • UAC bypass

    • Windows security bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Adds policy Run key to start application

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks