General

  • Target

    52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118

  • Size

    452KB

  • Sample

    241017-v2v2aawgrd

  • MD5

    52db8262b6fdfc265caa70b7aa6abd14

  • SHA1

    561ede3362c63dfe224dfe9f98544673bf9f293b

  • SHA256

    51904d5c59460a8d90236bee6cf28176de7c4ceb0b2e7abae2e5ad3ed4ce3bf2

  • SHA512

    c20e122280a5ded19e7c2f839c008f958852cbeedd939eace37dbc5fa3ac0c58a6a86f140ec065b80bf3cd17aba30d6f326daab71e77274f3d6b2453b4448782

  • SSDEEP

    12288:GLO+MJClrwmPuuqcor/1/4UkNpxWBulXZDCzAI:GLO+MAUmHbo1tkV4+CD

Malware Config

Targets

    • Target

      52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118

    • Size

      452KB

    • MD5

      52db8262b6fdfc265caa70b7aa6abd14

    • SHA1

      561ede3362c63dfe224dfe9f98544673bf9f293b

    • SHA256

      51904d5c59460a8d90236bee6cf28176de7c4ceb0b2e7abae2e5ad3ed4ce3bf2

    • SHA512

      c20e122280a5ded19e7c2f839c008f958852cbeedd939eace37dbc5fa3ac0c58a6a86f140ec065b80bf3cd17aba30d6f326daab71e77274f3d6b2453b4448782

    • SSDEEP

      12288:GLO+MJClrwmPuuqcor/1/4UkNpxWBulXZDCzAI:GLO+MAUmHbo1tkV4+CD

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks