General

  • Target

    42e2c1ca8af67130d9ffea86fa259c9a_JaffaCakes118

  • Size

    247KB

  • Sample

    241014-szzwcawdll

  • MD5

    42e2c1ca8af67130d9ffea86fa259c9a

  • SHA1

    2bc78cb9dbaf07e646a980538811ae4a0fb9ac24

  • SHA256

    6a1f3dd373df4ff19f842f0171ffa148ac4b2f88b5a87ff3bc42d012a215179f

  • SHA512

    fc1f8198adf886ac148f030a680ae0043b6dcb5975ec24fdedec0db49b50d093cde6249f3058ab33d0a3c161840381679290262953b46b7616850c06d23341ed

  • SSDEEP

    6144:tOxiV8jwcD5MCF8y1unn66DhhA/JMqWVcj3uRmk:2wctMLy0nn68PA/JMnV08mk

Malware Config

Targets

    • Target

      42e2c1ca8af67130d9ffea86fa259c9a_JaffaCakes118

    • Size

      247KB

    • MD5

      42e2c1ca8af67130d9ffea86fa259c9a

    • SHA1

      2bc78cb9dbaf07e646a980538811ae4a0fb9ac24

    • SHA256

      6a1f3dd373df4ff19f842f0171ffa148ac4b2f88b5a87ff3bc42d012a215179f

    • SHA512

      fc1f8198adf886ac148f030a680ae0043b6dcb5975ec24fdedec0db49b50d093cde6249f3058ab33d0a3c161840381679290262953b46b7616850c06d23341ed

    • SSDEEP

      6144:tOxiV8jwcD5MCF8y1unn66DhhA/JMqWVcj3uRmk:2wctMLy0nn68PA/JMnV08mk

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks