General

  • Target

    38701b67a9cc4765449981a3dfb403a7_JaffaCakes118

  • Size

    489KB

  • Sample

    241012-e6zl9stdnf

  • MD5

    38701b67a9cc4765449981a3dfb403a7

  • SHA1

    e343f089ecf79efebb4a2cca8877f2a8565a9447

  • SHA256

    06c4e26af9651f6320535a7005941a98da73d89644a5ae77efcc1a1aa9ceeea0

  • SHA512

    8c4b1b305a05519c4d3263b959ed45e200bdc3604cc368830152b2e1d32559688531aefb00271fa923f73c970e79bef893a3b289c6890a5358cecef9f63d38dc

  • SSDEEP

    12288:vBueX337e5brD1zO4O46vcfhhkHT1+X+pd167QhEQ:genK5bX1zcP4hkR+E6Eh

Malware Config

Targets

    • Target

      38701b67a9cc4765449981a3dfb403a7_JaffaCakes118

    • Size

      489KB

    • MD5

      38701b67a9cc4765449981a3dfb403a7

    • SHA1

      e343f089ecf79efebb4a2cca8877f2a8565a9447

    • SHA256

      06c4e26af9651f6320535a7005941a98da73d89644a5ae77efcc1a1aa9ceeea0

    • SHA512

      8c4b1b305a05519c4d3263b959ed45e200bdc3604cc368830152b2e1d32559688531aefb00271fa923f73c970e79bef893a3b289c6890a5358cecef9f63d38dc

    • SSDEEP

      12288:vBueX337e5brD1zO4O46vcfhhkHT1+X+pd167QhEQ:genK5bX1zcP4hkR+E6Eh

    • Adds policy Run key to start application

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks