General

  • Target

    b30656c4b0cd5bc205289558a698b31d_JaffaCakes118

  • Size

    180KB

  • Sample

    241129-wy58hsvjfr

  • MD5

    b30656c4b0cd5bc205289558a698b31d

  • SHA1

    e413774fd0e18c160674e338faf24e38709a4503

  • SHA256

    e1d8c841c8bf815a50dee30a320ab9393ff7bec909fab549f5f8e3694ed68e8b

  • SHA512

    4046ad244be8ef7749f610c12be9a19c3aed130bd98ce2b28c65dd5fc9a79da06f156d0b3154fd3946fa2a1222d0c53444eeea73e43e90ca107398fb89aa0720

  • SSDEEP

    3072:ULeq5xt8wGscQNFGbO9QKqOyfZaElAogDuf97DwW3ABSZRL7OZTXwGHhy7H7gybB:U3xGwGscgmKg3lACV8W3qSZVO9w4h2br

Malware Config

Targets

    • Target

      b30656c4b0cd5bc205289558a698b31d_JaffaCakes118

    • Size

      180KB

    • MD5

      b30656c4b0cd5bc205289558a698b31d

    • SHA1

      e413774fd0e18c160674e338faf24e38709a4503

    • SHA256

      e1d8c841c8bf815a50dee30a320ab9393ff7bec909fab549f5f8e3694ed68e8b

    • SHA512

      4046ad244be8ef7749f610c12be9a19c3aed130bd98ce2b28c65dd5fc9a79da06f156d0b3154fd3946fa2a1222d0c53444eeea73e43e90ca107398fb89aa0720

    • SSDEEP

      3072:ULeq5xt8wGscQNFGbO9QKqOyfZaElAogDuf97DwW3ABSZRL7OZTXwGHhy7H7gybB:U3xGwGscgmKg3lACV8W3qSZVO9w4h2br

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks