General

  • Target

    6fccbe041e1dd9a5e2cb7fd93c981389_JaffaCakes118

  • Size

    526KB

  • Sample

    241023-tnrw2ayglh

  • MD5

    6fccbe041e1dd9a5e2cb7fd93c981389

  • SHA1

    9490421957fc19da0b0e273104f8a712e63c968d

  • SHA256

    c65ade0d652262eb829c23077cd9cf690115f18fce081d807a733cf66e23cd15

  • SHA512

    8154d547c08ae714e27b7e779d3dc81c722137bd7ede6cce942ff2869daa7eb1a241b243948db6489b57341918a3cf74838c76c0d2157783f2301987522820c1

  • SSDEEP

    3072:+R1y22xLm8D8CVUaBsG4J4llVFE764dym8:I1y225dD8Cz2J49e64dym8

Malware Config

Targets

    • Target

      6fccbe041e1dd9a5e2cb7fd93c981389_JaffaCakes118

    • Size

      526KB

    • MD5

      6fccbe041e1dd9a5e2cb7fd93c981389

    • SHA1

      9490421957fc19da0b0e273104f8a712e63c968d

    • SHA256

      c65ade0d652262eb829c23077cd9cf690115f18fce081d807a733cf66e23cd15

    • SHA512

      8154d547c08ae714e27b7e779d3dc81c722137bd7ede6cce942ff2869daa7eb1a241b243948db6489b57341918a3cf74838c76c0d2157783f2301987522820c1

    • SSDEEP

      3072:+R1y22xLm8D8CVUaBsG4J4llVFE764dym8:I1y225dD8Cz2J49e64dym8

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks