General

  • Target

    JaffaCakes118_6c201424ca5a1327b2e1191e8fd558f9

  • Size

    156KB

  • Sample

    250103-mzvzhazkcs

  • MD5

    6c201424ca5a1327b2e1191e8fd558f9

  • SHA1

    afbeef4ed2254ac942f47df49589cf960011b9cd

  • SHA256

    d2636f96a68a9f90b67545ac576e68de1cc8b7ef5a519f87180a8e117fe2cf1f

  • SHA512

    1e49f3a816a013d28ad9318c9002ec07e377cec7f64656905aa0710735e5bf0fe78c77fb38b13985f4558a638c2822e91b3b9e201b5dbe18b6a7ec827a3c2a9c

  • SSDEEP

    3072:BxfBciFN8oXGFsEoIk90HgChEITlwsMqMKFOC7eHPvA:BoiFk/HgmVwLyOvPo

Malware Config

Targets

    • Target

      JaffaCakes118_6c201424ca5a1327b2e1191e8fd558f9

    • Size

      156KB

    • MD5

      6c201424ca5a1327b2e1191e8fd558f9

    • SHA1

      afbeef4ed2254ac942f47df49589cf960011b9cd

    • SHA256

      d2636f96a68a9f90b67545ac576e68de1cc8b7ef5a519f87180a8e117fe2cf1f

    • SHA512

      1e49f3a816a013d28ad9318c9002ec07e377cec7f64656905aa0710735e5bf0fe78c77fb38b13985f4558a638c2822e91b3b9e201b5dbe18b6a7ec827a3c2a9c

    • SSDEEP

      3072:BxfBciFN8oXGFsEoIk90HgChEITlwsMqMKFOC7eHPvA:BoiFk/HgmVwLyOvPo

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks