General

  • Target

    c060849bfc22830185a1def4b2989fd0_JaffaCakes118

  • Size

    401KB

  • Sample

    241204-cvsngasler

  • MD5

    c060849bfc22830185a1def4b2989fd0

  • SHA1

    074e7ab1a64b5d93c185e988b9c8bc9d60aadc6e

  • SHA256

    1ab74d601c93f145d7d9326c1ea65144497207f0e8daf21d47ea762fb718e074

  • SHA512

    83b16b590ba30ada7ffa850f339449789a3eea04e1bed0770d102adba76b01f56cb7dedff4fbd1be3c9e9ee1a9041020b10b0fcfafd5d4e51523a943f61c7550

  • SSDEEP

    12288:5WAWFipjX/PL1HZO01LlAD2YIYsVRSHsDrK:5/WUB/5XLiKjD

Malware Config

Targets

    • Target

      c060849bfc22830185a1def4b2989fd0_JaffaCakes118

    • Size

      401KB

    • MD5

      c060849bfc22830185a1def4b2989fd0

    • SHA1

      074e7ab1a64b5d93c185e988b9c8bc9d60aadc6e

    • SHA256

      1ab74d601c93f145d7d9326c1ea65144497207f0e8daf21d47ea762fb718e074

    • SHA512

      83b16b590ba30ada7ffa850f339449789a3eea04e1bed0770d102adba76b01f56cb7dedff4fbd1be3c9e9ee1a9041020b10b0fcfafd5d4e51523a943f61c7550

    • SSDEEP

      12288:5WAWFipjX/PL1HZO01LlAD2YIYsVRSHsDrK:5/WUB/5XLiKjD

    • Modifies RDP port number used by Windows

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

MITRE ATT&CK Enterprise v15

Tasks