General

  • Target

    c0e45514fd5a3d753d5dcf88025f52ea_JaffaCakes118

  • Size

    252KB

  • Sample

    241204-fgrqssyjaj

  • MD5

    c0e45514fd5a3d753d5dcf88025f52ea

  • SHA1

    4e154be021ddc5c52ca30136cdbd82911700f4ac

  • SHA256

    bda852e75c054e1bbfcc880af4b3a8ead19bb8130921aada2a1541f328f1c9c9

  • SHA512

    6babbd91b562d8aafc9b0bfa9e4df5d43f8d0f63bfc1b833a3c199e3fe5a2031e8b0a205f27115bc2ac3a33518edec1bfcba4767368fe26361431406fd45dc72

  • SSDEEP

    3072:g4UlooTl0f9Idj9ebUYv7SX9TmeF/7HT4cj8+pBk5mUsURNZNeRRR:g48/yadjQblGt3F/7Hl/pBPURNZN

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      c0e45514fd5a3d753d5dcf88025f52ea_JaffaCakes118

    • Size

      252KB

    • MD5

      c0e45514fd5a3d753d5dcf88025f52ea

    • SHA1

      4e154be021ddc5c52ca30136cdbd82911700f4ac

    • SHA256

      bda852e75c054e1bbfcc880af4b3a8ead19bb8130921aada2a1541f328f1c9c9

    • SHA512

      6babbd91b562d8aafc9b0bfa9e4df5d43f8d0f63bfc1b833a3c199e3fe5a2031e8b0a205f27115bc2ac3a33518edec1bfcba4767368fe26361431406fd45dc72

    • SSDEEP

      3072:g4UlooTl0f9Idj9ebUYv7SX9TmeF/7HT4cj8+pBk5mUsURNZNeRRR:g48/yadjQblGt3F/7Hl/pBPURNZN

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks