General

  • Target

    d5181d8b3d1488c0f58a8cf5bfc04867_JaffaCakes118

  • Size

    308KB

  • Sample

    241208-ec1mga1mb1

  • MD5

    d5181d8b3d1488c0f58a8cf5bfc04867

  • SHA1

    7b0c89d3d06c02b49f0a8a8affc7ebe2106ffd75

  • SHA256

    79a92391e6dbcec703f9457d09588838dff2bd7425a2578e391b5faaecb6b031

  • SHA512

    a2967c0e10c26e7912e754fe6e07f8d7eb5e984d9a5fce60e7fb15db030c522304a06215ef5172c2553aad8d56defe1e4eea2e0b9958a691eabe6fdf81df5f25

  • SSDEEP

    3072:FYy0DkGJJo3Eu5pjkoxjZUcfiQ7lb3ST39tuoX2V8uCCVhHXcfYNLVzlDMy6cAF+:cHJo37xjyaiQRi79GV8ufHsfwXecA/U

Malware Config

Targets

    • Target

      d5181d8b3d1488c0f58a8cf5bfc04867_JaffaCakes118

    • Size

      308KB

    • MD5

      d5181d8b3d1488c0f58a8cf5bfc04867

    • SHA1

      7b0c89d3d06c02b49f0a8a8affc7ebe2106ffd75

    • SHA256

      79a92391e6dbcec703f9457d09588838dff2bd7425a2578e391b5faaecb6b031

    • SHA512

      a2967c0e10c26e7912e754fe6e07f8d7eb5e984d9a5fce60e7fb15db030c522304a06215ef5172c2553aad8d56defe1e4eea2e0b9958a691eabe6fdf81df5f25

    • SSDEEP

      3072:FYy0DkGJJo3Eu5pjkoxjZUcfiQ7lb3ST39tuoX2V8uCCVhHXcfYNLVzlDMy6cAF+:cHJo37xjyaiQRi79GV8ufHsfwXecA/U

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks