General

  • Target

    80ab06a6735834afa0d144ac43811686_JaffaCakes118

  • Size

    1.8MB

  • Sample

    241030-3tq2csvqgp

  • MD5

    80ab06a6735834afa0d144ac43811686

  • SHA1

    4c2516bf85f6011b52ed85cf6f44f333a577cd5b

  • SHA256

    59bed821cdd4c9d368d4ed4296af2e84425ad40c92c804ea18709790b7e4380a

  • SHA512

    fb7050247366331a1d920fbd235374d923ff36c623b373ba3b6a561a58b6319dc83679f9cd82bf0cf601b0f2b48b8d2cc875025adc0917a000cae6a108ddf546

  • SSDEEP

    49152:pmD4NSnnU5bnLtkfSP8KgkPiQT6JM34uc0C3SN4CZc:pgFnYe6kKgWiQT6Ji5CimF

Malware Config

Targets

    • Target

      80ab06a6735834afa0d144ac43811686_JaffaCakes118

    • Size

      1.8MB

    • MD5

      80ab06a6735834afa0d144ac43811686

    • SHA1

      4c2516bf85f6011b52ed85cf6f44f333a577cd5b

    • SHA256

      59bed821cdd4c9d368d4ed4296af2e84425ad40c92c804ea18709790b7e4380a

    • SHA512

      fb7050247366331a1d920fbd235374d923ff36c623b373ba3b6a561a58b6319dc83679f9cd82bf0cf601b0f2b48b8d2cc875025adc0917a000cae6a108ddf546

    • SSDEEP

      49152:pmD4NSnnU5bnLtkfSP8KgkPiQT6JM34uc0C3SN4CZc:pgFnYe6kKgWiQT6Ji5CimF

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • Diamondfox family

    • UAC bypass

    • Windows security bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Adds policy Run key to start application

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks