General

  • Target

    90ddad41a8b2676f513e82921d6068b7_JaffaCakes118

  • Size

    152KB

  • Sample

    241123-1saxmsvlcq

  • MD5

    90ddad41a8b2676f513e82921d6068b7

  • SHA1

    7bb7cfb9776c1ca28cbbf600dd532f35cb674e71

  • SHA256

    99ced5da45489dedc0dc9dc2eb6e902944e6e891e18b5f23f93b1114d9e06c5f

  • SHA512

    026172b0171b5a6c4c79c4509a057ac208b2a9514a634033c18ab32d363abf161865618b9f0c89c9795d095c3fbdf7222d1db43d44c0012cc5a2fe11a9e1b79e

  • SSDEEP

    3072:nnBzIhJK9QVudpb9bQMj7ox6oFBm4t9QoZ8rad/XpAVGBCwD1z9p4L3KZkjLfHt:nBzz9ldppb5Mzm4/QoKradmVGBCSmLai

Malware Config

Targets

    • Target

      90ddad41a8b2676f513e82921d6068b7_JaffaCakes118

    • Size

      152KB

    • MD5

      90ddad41a8b2676f513e82921d6068b7

    • SHA1

      7bb7cfb9776c1ca28cbbf600dd532f35cb674e71

    • SHA256

      99ced5da45489dedc0dc9dc2eb6e902944e6e891e18b5f23f93b1114d9e06c5f

    • SHA512

      026172b0171b5a6c4c79c4509a057ac208b2a9514a634033c18ab32d363abf161865618b9f0c89c9795d095c3fbdf7222d1db43d44c0012cc5a2fe11a9e1b79e

    • SSDEEP

      3072:nnBzIhJK9QVudpb9bQMj7ox6oFBm4t9QoZ8rad/XpAVGBCwD1z9p4L3KZkjLfHt:nBzz9ldppb5Mzm4/QoKradmVGBCSmLai

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks