General

  • Target

    deb9daacc6e311f2838892636818ae66_JaffaCakes118

  • Size

    340KB

  • Sample

    241210-19rlqaskdt

  • MD5

    deb9daacc6e311f2838892636818ae66

  • SHA1

    72a40cff54a2a7351b49e703b26be9028ac1c164

  • SHA256

    52e8a95750d0793b2ef97f7c320d09173f4ee99fce82f7635ee78a0040bde9f2

  • SHA512

    507e61263905699f8af4956f049d5044352837e9c085eaa23806b2fb6421545e3581a1b725d4c2259db541c1436da2a1f472a59f5ddd13b7ce23b550cb4b04ba

  • SSDEEP

    6144:3796iM+buFRMPnEmUYkkmemLo6BHj79sm6x1G18s7FDjHrHe:37RTubNbfOKn79D61ClFze

Malware Config

Targets

    • Target

      deb9daacc6e311f2838892636818ae66_JaffaCakes118

    • Size

      340KB

    • MD5

      deb9daacc6e311f2838892636818ae66

    • SHA1

      72a40cff54a2a7351b49e703b26be9028ac1c164

    • SHA256

      52e8a95750d0793b2ef97f7c320d09173f4ee99fce82f7635ee78a0040bde9f2

    • SHA512

      507e61263905699f8af4956f049d5044352837e9c085eaa23806b2fb6421545e3581a1b725d4c2259db541c1436da2a1f472a59f5ddd13b7ce23b550cb4b04ba

    • SSDEEP

      6144:3796iM+buFRMPnEmUYkkmemLo6BHj79sm6x1G18s7FDjHrHe:37RTubNbfOKn79D61ClFze

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks