General

  • Target

    9f11e80b937a80d10662272eecd3b5d6_JaffaCakes118

  • Size

    720KB

  • Sample

    241126-byv3bstnal

  • MD5

    9f11e80b937a80d10662272eecd3b5d6

  • SHA1

    6beaf8431439e6ab8bc6e7e5362c34dac9a30c82

  • SHA256

    e40d738784e02c5c3e9528873d8ceb8737f51ddf29deac980ae01de06b10c95f

  • SHA512

    d22248a9004521f4ad45b130666bd1a4277bdcc951a9f08de6f838e47b53eb08e0b2beb239f6ff37e9775a051461524089f84abed92776e74b4b8f6f747a3d19

  • SSDEEP

    12288:nXgvmzFHi0mo5aH0qMzd5807FRPJQPDHvd:nXgvOHi0mGaH0qSdPFr4V

Malware Config

Targets

    • Target

      9f11e80b937a80d10662272eecd3b5d6_JaffaCakes118

    • Size

      720KB

    • MD5

      9f11e80b937a80d10662272eecd3b5d6

    • SHA1

      6beaf8431439e6ab8bc6e7e5362c34dac9a30c82

    • SHA256

      e40d738784e02c5c3e9528873d8ceb8737f51ddf29deac980ae01de06b10c95f

    • SHA512

      d22248a9004521f4ad45b130666bd1a4277bdcc951a9f08de6f838e47b53eb08e0b2beb239f6ff37e9775a051461524089f84abed92776e74b4b8f6f747a3d19

    • SSDEEP

      12288:nXgvmzFHi0mo5aH0qMzd5807FRPJQPDHvd:nXgvOHi0mGaH0qSdPFr4V

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks