General

  • Target

    96b8422adc53ac3aec514e98eba31843_JaffaCakes118

  • Size

    189KB

  • Sample

    241124-x219ea1lcl

  • MD5

    96b8422adc53ac3aec514e98eba31843

  • SHA1

    cb17acd6eba24efa3762f32400779406a8bba943

  • SHA256

    dd7f608d8c1c9bb2258dc9af7da414f833e4262299c472ee0f64f74b094c21c4

  • SHA512

    a709b83b82b1feb3ef4fdcd4dca2e8486ae72005fc10c934ba54e7a64b5229dd696e64085ef28fae32f724d527f68412595ca5612507473e4794af2e2c142fb1

  • SSDEEP

    3072:+ttOf4bwPdy5X4kpEMG04a74gZ/s4yP3PHr:++IpvM0T74bxP3T

Malware Config

Targets

    • Target

      96b8422adc53ac3aec514e98eba31843_JaffaCakes118

    • Size

      189KB

    • MD5

      96b8422adc53ac3aec514e98eba31843

    • SHA1

      cb17acd6eba24efa3762f32400779406a8bba943

    • SHA256

      dd7f608d8c1c9bb2258dc9af7da414f833e4262299c472ee0f64f74b094c21c4

    • SHA512

      a709b83b82b1feb3ef4fdcd4dca2e8486ae72005fc10c934ba54e7a64b5229dd696e64085ef28fae32f724d527f68412595ca5612507473e4794af2e2c142fb1

    • SSDEEP

      3072:+ttOf4bwPdy5X4kpEMG04a74gZ/s4yP3PHr:++IpvM0T74bxP3T

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks