General

  • Target

    be7511bebd1d6ecaacb9e71637050bd4_JaffaCakes118

  • Size

    661KB

  • Sample

    241203-v3f9hs1mdk

  • MD5

    be7511bebd1d6ecaacb9e71637050bd4

  • SHA1

    90178b89ada15bb6438a5bee70797d88da85f9b4

  • SHA256

    dd5abd033864ac31910056f39b74ee1d7affd2ae1406399f8652465ed2429342

  • SHA512

    118cbd4be152325880882eebd7e47263f36af74bd3536abbc15f7a24e472fc880c03eebab50bf4e17abdcfa516b97b5552b779e55245b029d6ad196300a92aff

  • SSDEEP

    3072:CNnqDxIGX/9nDiG7t6yCAti1zxGJidD5iYAHg4Cs7lJgxwL0out:CNnxKL0oS

Malware Config

Targets

    • Target

      be7511bebd1d6ecaacb9e71637050bd4_JaffaCakes118

    • Size

      661KB

    • MD5

      be7511bebd1d6ecaacb9e71637050bd4

    • SHA1

      90178b89ada15bb6438a5bee70797d88da85f9b4

    • SHA256

      dd5abd033864ac31910056f39b74ee1d7affd2ae1406399f8652465ed2429342

    • SHA512

      118cbd4be152325880882eebd7e47263f36af74bd3536abbc15f7a24e472fc880c03eebab50bf4e17abdcfa516b97b5552b779e55245b029d6ad196300a92aff

    • SSDEEP

      3072:CNnqDxIGX/9nDiG7t6yCAti1zxGJidD5iYAHg4Cs7lJgxwL0out:CNnxKL0oS

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks