General

  • Target

    8da390fc5822d797f2b35456d0d77985_JaffaCakes118

  • Size

    172KB

  • Sample

    241103-1kk3mswbmj

  • MD5

    8da390fc5822d797f2b35456d0d77985

  • SHA1

    60476332c8bed700e6069778bba2ba0c8d34614b

  • SHA256

    2ed74e91b3d3243eb59dc94f8d42ecb53c12100ce06cc07f10c17b7a5a31ca74

  • SHA512

    6505c01cc036661f3bc25f881e6188d70302525cc6d2a8d34d04d59345b261e4474aa928750aced2d320a1da364484b96a5f12003bec0d1a345279a2ce2cc4ec

  • SSDEEP

    3072:oUSge4zN2C+yQI4lomSIeLOuBGxjyJ2y50P9buOD9a3RjNgIr0GMo6:Zte4zNiyQTS35BGh0aHEqiNI

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      8da390fc5822d797f2b35456d0d77985_JaffaCakes118

    • Size

      172KB

    • MD5

      8da390fc5822d797f2b35456d0d77985

    • SHA1

      60476332c8bed700e6069778bba2ba0c8d34614b

    • SHA256

      2ed74e91b3d3243eb59dc94f8d42ecb53c12100ce06cc07f10c17b7a5a31ca74

    • SHA512

      6505c01cc036661f3bc25f881e6188d70302525cc6d2a8d34d04d59345b261e4474aa928750aced2d320a1da364484b96a5f12003bec0d1a345279a2ce2cc4ec

    • SSDEEP

      3072:oUSge4zN2C+yQI4lomSIeLOuBGxjyJ2y50P9buOD9a3RjNgIr0GMo6:Zte4zNiyQTS35BGh0aHEqiNI

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks