General

  • Target

    be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118

  • Size

    168KB

  • Sample

    241203-s1qzts1mc1

  • MD5

    be0eca65895cda00be3570fbf9f71e3d

  • SHA1

    e6cdf794ccedd55f7355b632936ff84de7adf889

  • SHA256

    e94750aa11e7e0946ecd9548d806f4a2dda84ecb75b895c2d9f84b77395ca0f7

  • SHA512

    e8e86fb5f8469776fc005ee0bae4de2ce83492f0a2cf5c6a7ee2d376f3fd977cf8b972719872737b242cef6e909449fa890688f29236abba307aaa1f3f597bcc

  • SSDEEP

    3072:YzpptnCRqBxWhwO8pJ8j5ouK9Uq8Rcg2yAXuM9APy0/L6r1+KD60L:2DCRAc1OJYoLOq8RAy4uDP5/rg

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118

    • Size

      168KB

    • MD5

      be0eca65895cda00be3570fbf9f71e3d

    • SHA1

      e6cdf794ccedd55f7355b632936ff84de7adf889

    • SHA256

      e94750aa11e7e0946ecd9548d806f4a2dda84ecb75b895c2d9f84b77395ca0f7

    • SHA512

      e8e86fb5f8469776fc005ee0bae4de2ce83492f0a2cf5c6a7ee2d376f3fd977cf8b972719872737b242cef6e909449fa890688f29236abba307aaa1f3f597bcc

    • SSDEEP

      3072:YzpptnCRqBxWhwO8pJ8j5ouK9Uq8Rcg2yAXuM9APy0/L6r1+KD60L:2DCRAc1OJYoLOq8RAy4uDP5/rg

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks