General

  • Target

    91611f016caa714eb130e771cf054436_JaffaCakes118

  • Size

    105KB

  • Sample

    241123-3v8msssrfx

  • MD5

    91611f016caa714eb130e771cf054436

  • SHA1

    21ef11761dd0d4d6bbdefdd7306bc74e4f0c81ce

  • SHA256

    a78c500d5d0acbb420a1c56504d99b34d414728dfc2f036f39929f4190c4f7e9

  • SHA512

    cf1d1ab4c2316b272d7d4bfc53e42f67c6f0485fa8a22e6a2e6c41275b4511df2385a174351128e19f42ad745bace76b9d36ef9119a2ae03b355f2f3c8688a78

  • SSDEEP

    3072:zAK0CBezOU+8isBve4bF3u5jwaaHw7Koj4rIG:83z+svb1uz

Malware Config

Targets

    • Target

      91611f016caa714eb130e771cf054436_JaffaCakes118

    • Size

      105KB

    • MD5

      91611f016caa714eb130e771cf054436

    • SHA1

      21ef11761dd0d4d6bbdefdd7306bc74e4f0c81ce

    • SHA256

      a78c500d5d0acbb420a1c56504d99b34d414728dfc2f036f39929f4190c4f7e9

    • SHA512

      cf1d1ab4c2316b272d7d4bfc53e42f67c6f0485fa8a22e6a2e6c41275b4511df2385a174351128e19f42ad745bace76b9d36ef9119a2ae03b355f2f3c8688a78

    • SSDEEP

      3072:zAK0CBezOU+8isBve4bF3u5jwaaHw7Koj4rIG:83z+svb1uz

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks