General

  • Target

    b4eedd919843a6803fe3a7695ee154c0_JaffaCakes118

  • Size

    970KB

  • Sample

    241130-fv7n6stqb1

  • MD5

    b4eedd919843a6803fe3a7695ee154c0

  • SHA1

    533cc556310b099034116e9e31eb56f31db09ea0

  • SHA256

    50672a7690d16a2cd3281c19929b1d7ee307409a731bc52fcbb52ce2a50d93c4

  • SHA512

    04003fb8894324990552cac995bb1852e84204f8f35b04e4c6056d78987d46fac0ea82ce40b9188252a213e90148b0e2d310294fc003c23005c83d75d34a4748

  • SSDEEP

    1536:7ws+Dd8oVCTSzQHhn0lIF2rX2OKvQ4m6OXHGvA3D0FsBRyBYOKG0Ph:8ZCoaSzQB0iiaSvTyCRy+4

Malware Config

Targets

    • Target

      b4eedd919843a6803fe3a7695ee154c0_JaffaCakes118

    • Size

      970KB

    • MD5

      b4eedd919843a6803fe3a7695ee154c0

    • SHA1

      533cc556310b099034116e9e31eb56f31db09ea0

    • SHA256

      50672a7690d16a2cd3281c19929b1d7ee307409a731bc52fcbb52ce2a50d93c4

    • SHA512

      04003fb8894324990552cac995bb1852e84204f8f35b04e4c6056d78987d46fac0ea82ce40b9188252a213e90148b0e2d310294fc003c23005c83d75d34a4748

    • SSDEEP

      1536:7ws+Dd8oVCTSzQHhn0lIF2rX2OKvQ4m6OXHGvA3D0FsBRyBYOKG0Ph:8ZCoaSzQB0iiaSvTyCRy+4

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks