General

  • Target

    JaffaCakes118_78c0f47c22df8b727fbe9bca387b0cf6

  • Size

    156KB

  • Sample

    250104-kn3tvsska1

  • MD5

    78c0f47c22df8b727fbe9bca387b0cf6

  • SHA1

    7cd6bfc2cb3794d2a71d4dd48a3abeeb75f89b14

  • SHA256

    8b71107b3a3edfbfd384f623cc1bda94828e62189b24d34fec04839a7e474f11

  • SHA512

    f0b08bc187ba6e7234c25f24aec1b8a1244f555be7f2c766047c2f33408dd55217ccc980b175f2c0cb2379f67f101322554bb0b4d35af602456b636631023325

  • SSDEEP

    3072:tZTFpmROg9G/ztpbaEdFAZKPxnL1RSaVPgb6R5Kvr:+9YzpFxLTSGYb638

Malware Config

Targets

    • Target

      JaffaCakes118_78c0f47c22df8b727fbe9bca387b0cf6

    • Size

      156KB

    • MD5

      78c0f47c22df8b727fbe9bca387b0cf6

    • SHA1

      7cd6bfc2cb3794d2a71d4dd48a3abeeb75f89b14

    • SHA256

      8b71107b3a3edfbfd384f623cc1bda94828e62189b24d34fec04839a7e474f11

    • SHA512

      f0b08bc187ba6e7234c25f24aec1b8a1244f555be7f2c766047c2f33408dd55217ccc980b175f2c0cb2379f67f101322554bb0b4d35af602456b636631023325

    • SSDEEP

      3072:tZTFpmROg9G/ztpbaEdFAZKPxnL1RSaVPgb6R5Kvr:+9YzpFxLTSGYb638

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks