General

  • Target

    a722e241530d41a570c50f98175ea7ad_JaffaCakes118

  • Size

    254KB

  • Sample

    241127-lfj78atrgn

  • MD5

    a722e241530d41a570c50f98175ea7ad

  • SHA1

    0c477e473a3e82bf6ca3a3d42074f239e3e395cd

  • SHA256

    ea4a78226182e05ef4c1be2a9125f3fe37ccbf16c32359d73f4fff0c7e9e1e6f

  • SHA512

    faef8e02e819df30851cb1789de2975d7505fea957d34ef6fe46699e48c0fddaeff8263bac3b62f6031394aff5ad4ec0eb81d8df6a5872cfd42d17496a327379

  • SSDEEP

    3072:8ten3nHLUPHt2uYVxa2E65gQS4SCgagXas/WF3R/ul1r/EJUoQwXZ+5et+A:8438cQ2aSuSNuDr//BSZge

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      a722e241530d41a570c50f98175ea7ad_JaffaCakes118

    • Size

      254KB

    • MD5

      a722e241530d41a570c50f98175ea7ad

    • SHA1

      0c477e473a3e82bf6ca3a3d42074f239e3e395cd

    • SHA256

      ea4a78226182e05ef4c1be2a9125f3fe37ccbf16c32359d73f4fff0c7e9e1e6f

    • SHA512

      faef8e02e819df30851cb1789de2975d7505fea957d34ef6fe46699e48c0fddaeff8263bac3b62f6031394aff5ad4ec0eb81d8df6a5872cfd42d17496a327379

    • SSDEEP

      3072:8ten3nHLUPHt2uYVxa2E65gQS4SCgagXas/WF3R/ul1r/EJUoQwXZ+5et+A:8438cQ2aSuSNuDr//BSZge

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks