General

  • Target

    b20d003545125a0e73653bfee99206a8_JaffaCakes118

  • Size

    268KB

  • Sample

    241129-sjp17ssjgv

  • MD5

    b20d003545125a0e73653bfee99206a8

  • SHA1

    c683e669cfac0a350d34f73c5dd06d1f2663bbba

  • SHA256

    7d8d418e3cc18a3bedf8b6a6bb703e12ef4266796f0ac86c31042833ae43b68d

  • SHA512

    5ddd8659db62764035d04e26a76809926f044fb8ae7180ec064a4d6a2ed91f24f686c22695475a6452ab6c7e866e2289caff991e4a3df77ddc5d0ff9c477c1d2

  • SSDEEP

    6144:40xrdIwioULocdUhwdWYCYczeougs6c7N4a90XBg:405/0aw

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      b20d003545125a0e73653bfee99206a8_JaffaCakes118

    • Size

      268KB

    • MD5

      b20d003545125a0e73653bfee99206a8

    • SHA1

      c683e669cfac0a350d34f73c5dd06d1f2663bbba

    • SHA256

      7d8d418e3cc18a3bedf8b6a6bb703e12ef4266796f0ac86c31042833ae43b68d

    • SHA512

      5ddd8659db62764035d04e26a76809926f044fb8ae7180ec064a4d6a2ed91f24f686c22695475a6452ab6c7e866e2289caff991e4a3df77ddc5d0ff9c477c1d2

    • SSDEEP

      6144:40xrdIwioULocdUhwdWYCYczeougs6c7N4a90XBg:405/0aw

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks