General

  • Target

    9b9da065249e8fe54710e673923b7cd5_JaffaCakes118

  • Size

    35KB

  • Sample

    241125-p6ft9sxmhz

  • MD5

    9b9da065249e8fe54710e673923b7cd5

  • SHA1

    855744b965629510b6929fa1d2e19cd6c796f030

  • SHA256

    56290c2104affa1cf206123446540929c031486b6c3b3519b2de9a96963c9710

  • SHA512

    4a38a4bc84911ece6042746aa631e5077373197b2cec269c3b89b7bbb4bf0b0fd992b080f69d7c1daab608b9653be9f48cbce0c9bb9ac6a89a3ca2ffc566d1f3

  • SSDEEP

    768:Di/8POyOVXowzUyQ9EKa2Fi9k13ebvMSPIl1R3R:DNPlOVXowzUL+KOOMb0P33R

Malware Config

Targets

    • Target

      9b9da065249e8fe54710e673923b7cd5_JaffaCakes118

    • Size

      35KB

    • MD5

      9b9da065249e8fe54710e673923b7cd5

    • SHA1

      855744b965629510b6929fa1d2e19cd6c796f030

    • SHA256

      56290c2104affa1cf206123446540929c031486b6c3b3519b2de9a96963c9710

    • SHA512

      4a38a4bc84911ece6042746aa631e5077373197b2cec269c3b89b7bbb4bf0b0fd992b080f69d7c1daab608b9653be9f48cbce0c9bb9ac6a89a3ca2ffc566d1f3

    • SSDEEP

      768:Di/8POyOVXowzUyQ9EKa2Fi9k13ebvMSPIl1R3R:DNPlOVXowzUL+KOOMb0P33R

    • R77 family

    • r77

      r77 is an open-source, userland rootkit.

    • r77 rootkit payload

      Detects the payload of the r77 rootkit.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks