General

  • Target

    c994ac23ee21564133994e6e24b67168_JaffaCakes118

  • Size

    211KB

  • Sample

    241205-11mamstqgx

  • MD5

    c994ac23ee21564133994e6e24b67168

  • SHA1

    0e2c55e9d19a881cfe54e25c49724f7df017f4bd

  • SHA256

    df6c94557ffa0d77f81d7212bdd4a5f02a58b4f2ab3c86f71776c823a7e2da7b

  • SHA512

    b3475dbf224673eb406842503e1c366f642f22be10bb7de86eb58669ee83a8388ab410ad2f316849f8daa44895aef444a5783dfa49ef315e7b4ca2f6716cb1c8

  • SSDEEP

    3072:1A+mAWeJiRJDr5u1wvEvUPjP+Hcp5MNJRrtTl5w1yNgMOFESB5rWepnwz40LNdl:1XWNEvUq8p5aFNNnOzB1WYcvnl

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      c994ac23ee21564133994e6e24b67168_JaffaCakes118

    • Size

      211KB

    • MD5

      c994ac23ee21564133994e6e24b67168

    • SHA1

      0e2c55e9d19a881cfe54e25c49724f7df017f4bd

    • SHA256

      df6c94557ffa0d77f81d7212bdd4a5f02a58b4f2ab3c86f71776c823a7e2da7b

    • SHA512

      b3475dbf224673eb406842503e1c366f642f22be10bb7de86eb58669ee83a8388ab410ad2f316849f8daa44895aef444a5783dfa49ef315e7b4ca2f6716cb1c8

    • SSDEEP

      3072:1A+mAWeJiRJDr5u1wvEvUPjP+Hcp5MNJRrtTl5w1yNgMOFESB5rWepnwz40LNdl:1XWNEvUq8p5aFNNnOzB1WYcvnl

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks