General

  • Target

    f599abb1bd76636cd689728e6e40b7cc_JaffaCakes118

  • Size

    200KB

  • Sample

    241215-y3vzfsvrhs

  • MD5

    f599abb1bd76636cd689728e6e40b7cc

  • SHA1

    c842f02dba8e6ccb2d2e5daa6cb736ad4b76d9b9

  • SHA256

    17338a454f7baf5f73b7ff7a65e322e328f0dc192b3de8e50d9a0205fc8cd57f

  • SHA512

    cd325d43649cf4fb575d503b2edd1c47f56bbf6103ea186374680dd1d085f6947a9080599cce6a6e9627db9d452447ad63f4f080423e0672d3504b2dd2f0e72e

  • SSDEEP

    3072:DpNFkmhDDo7QFDE5ICjmYq8Uh+cjTm9KpZQqekhwrjm2IHd/2pzl:ltAbJq8UHjTm9KYSwW1ep

Malware Config

Targets

    • Target

      f599abb1bd76636cd689728e6e40b7cc_JaffaCakes118

    • Size

      200KB

    • MD5

      f599abb1bd76636cd689728e6e40b7cc

    • SHA1

      c842f02dba8e6ccb2d2e5daa6cb736ad4b76d9b9

    • SHA256

      17338a454f7baf5f73b7ff7a65e322e328f0dc192b3de8e50d9a0205fc8cd57f

    • SHA512

      cd325d43649cf4fb575d503b2edd1c47f56bbf6103ea186374680dd1d085f6947a9080599cce6a6e9627db9d452447ad63f4f080423e0672d3504b2dd2f0e72e

    • SSDEEP

      3072:DpNFkmhDDo7QFDE5ICjmYq8Uh+cjTm9KpZQqekhwrjm2IHd/2pzl:ltAbJq8UHjTm9KYSwW1ep

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks