General

  • Target

    c6249413efcd3e58d88dceed473493b7_JaffaCakes118

  • Size

    256KB

  • Sample

    241205-f9raqs1ldt

  • MD5

    c6249413efcd3e58d88dceed473493b7

  • SHA1

    7c30049862fc8a636ee14de87308515dfa186ca6

  • SHA256

    b24ecc0c081c5569a70595829d86a1a7fd395b5b14f6cfd647f0641c05be3cb1

  • SHA512

    c04e5850b460f387ac4eb746d190db8555912ed2d2ee9b8840ccae7b94a14cef91b1ced6eb1992ce755468cdc6cbe607cc887f4d84547b12335d396787be5f79

  • SSDEEP

    6144:+eCLGDZIry5WchpMXxvQqf30Q0UE00e0Vl550ZUf30Q0UE00e0Vl550ZUf:+e7IrxiKhvnf39vE0Xil55Bf39vE0Xin

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      c6249413efcd3e58d88dceed473493b7_JaffaCakes118

    • Size

      256KB

    • MD5

      c6249413efcd3e58d88dceed473493b7

    • SHA1

      7c30049862fc8a636ee14de87308515dfa186ca6

    • SHA256

      b24ecc0c081c5569a70595829d86a1a7fd395b5b14f6cfd647f0641c05be3cb1

    • SHA512

      c04e5850b460f387ac4eb746d190db8555912ed2d2ee9b8840ccae7b94a14cef91b1ced6eb1992ce755468cdc6cbe607cc887f4d84547b12335d396787be5f79

    • SSDEEP

      6144:+eCLGDZIry5WchpMXxvQqf30Q0UE00e0Vl550ZUf30Q0UE00e0Vl550ZUf:+e7IrxiKhvnf39vE0Xil55Bf39vE0Xin

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks