General

  • Target

    ee6e26b34ceadf4eef636ad464e246ce_JaffaCakes118

  • Size

    146KB

  • Sample

    241214-m31zxszkfy

  • MD5

    ee6e26b34ceadf4eef636ad464e246ce

  • SHA1

    c2650b133b4dca14a8b9b6ba6623cfd0f5df7f15

  • SHA256

    64707490b33ad79a7f1218410c7c2cc46ba1bce6fcdfe88c003ddba452bd1c5e

  • SHA512

    02241cde9e50312143e7cad6e0bb46b53da3a449856b349a122431bced84244b5f15d8305a520508c8fdc4b310e2e8961373f00c42f30d3e87b7bbd6b326aa0d

  • SSDEEP

    3072:Wo9fVU7q5YYEJl9/lV6CYDjftMJQIFPBdX+HaXh4V5AT6J0M:WoBgLJYiJ3sihC86J0M

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ee6e26b34ceadf4eef636ad464e246ce_JaffaCakes118

    • Size

      146KB

    • MD5

      ee6e26b34ceadf4eef636ad464e246ce

    • SHA1

      c2650b133b4dca14a8b9b6ba6623cfd0f5df7f15

    • SHA256

      64707490b33ad79a7f1218410c7c2cc46ba1bce6fcdfe88c003ddba452bd1c5e

    • SHA512

      02241cde9e50312143e7cad6e0bb46b53da3a449856b349a122431bced84244b5f15d8305a520508c8fdc4b310e2e8961373f00c42f30d3e87b7bbd6b326aa0d

    • SSDEEP

      3072:Wo9fVU7q5YYEJl9/lV6CYDjftMJQIFPBdX+HaXh4V5AT6J0M:WoBgLJYiJ3sihC86J0M

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks