General

  • Target

    97be84a0b51c4a6f24b56e71291b46fa_JaffaCakes118

  • Size

    105KB

  • Sample

    241124-24e66s1jbk

  • MD5

    97be84a0b51c4a6f24b56e71291b46fa

  • SHA1

    46047ee2ddc7e90a2ab8d1b2a753fbefc2bac36c

  • SHA256

    ed00ca420f47e9bf58a040ce1d3a369b672f52b7292123de9dec711b6ae66232

  • SHA512

    69557830053f8da53ba402df8ccdf9bdecd842f7c1d069e320d325cb6d4815b130ac502d3e45a0d752fe4bb8558e08ac569c26a1ca40be4a942ebad7b89bcf29

  • SSDEEP

    3072:yy9tGqOxnexUYMg2zk8jwaaHw7Koj4rVffffffffffffff:p9bpU

Malware Config

Targets

    • Target

      97be84a0b51c4a6f24b56e71291b46fa_JaffaCakes118

    • Size

      105KB

    • MD5

      97be84a0b51c4a6f24b56e71291b46fa

    • SHA1

      46047ee2ddc7e90a2ab8d1b2a753fbefc2bac36c

    • SHA256

      ed00ca420f47e9bf58a040ce1d3a369b672f52b7292123de9dec711b6ae66232

    • SHA512

      69557830053f8da53ba402df8ccdf9bdecd842f7c1d069e320d325cb6d4815b130ac502d3e45a0d752fe4bb8558e08ac569c26a1ca40be4a942ebad7b89bcf29

    • SSDEEP

      3072:yy9tGqOxnexUYMg2zk8jwaaHw7Koj4rVffffffffffffff:p9bpU

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks