General

  • Target

    97905a10f75eb7a5e5e58c152db92d03_JaffaCakes118

  • Size

    247KB

  • Sample

    241124-2dywlatjby

  • MD5

    97905a10f75eb7a5e5e58c152db92d03

  • SHA1

    5330027f4cb181663b85c69dd5fdd8853933a79e

  • SHA256

    5465bbe3edbbac18516be747228ead445fb075cb85b377cc3430fbb877615395

  • SHA512

    683f162a3e92eb3cde7b6cf8a763006f0d67f651c4fa441a6602eb5d14f623feb51d9d7437733cc56880e1857ca988c630470a43eb283c015ee7788f85e7dca8

  • SSDEEP

    6144:ZgnOWFfRtJCARMA18fnvq3qYRiB8/xBUvysTUR8Gj3aJs:SOSp/CARMACnvAi+p3sQzDaG

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      97905a10f75eb7a5e5e58c152db92d03_JaffaCakes118

    • Size

      247KB

    • MD5

      97905a10f75eb7a5e5e58c152db92d03

    • SHA1

      5330027f4cb181663b85c69dd5fdd8853933a79e

    • SHA256

      5465bbe3edbbac18516be747228ead445fb075cb85b377cc3430fbb877615395

    • SHA512

      683f162a3e92eb3cde7b6cf8a763006f0d67f651c4fa441a6602eb5d14f623feb51d9d7437733cc56880e1857ca988c630470a43eb283c015ee7788f85e7dca8

    • SSDEEP

      6144:ZgnOWFfRtJCARMA18fnvq3qYRiB8/xBUvysTUR8Gj3aJs:SOSp/CARMACnvAi+p3sQzDaG

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks