General

  • Target

    JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce

  • Size

    1.8MB

  • Sample

    250107-rb96qswldj

  • MD5

    671abad82fb56ab716e9e0ffbca116ce

  • SHA1

    3707df01e839d5b67604debfbc762011593eb822

  • SHA256

    00d778b5fc11785ec2e51beb292a872a790a54a48889558ca64f03d8e9a1a6fd

  • SHA512

    c0d560081734ade5adcc32d401a014b53410270e1a8e97065bf2c04decdeece555762b6834dd20366aa4b75586a6dcdb6616f7b004d8ff429f3681d862bc2bdf

  • SSDEEP

    49152:CG6rYHQQFDut9t96xHVur1h63EuHenNMZ+Kzi:q8HQSosHM63EEWNMvzi

Malware Config

Targets

    • Target

      JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce

    • Size

      1.8MB

    • MD5

      671abad82fb56ab716e9e0ffbca116ce

    • SHA1

      3707df01e839d5b67604debfbc762011593eb822

    • SHA256

      00d778b5fc11785ec2e51beb292a872a790a54a48889558ca64f03d8e9a1a6fd

    • SHA512

      c0d560081734ade5adcc32d401a014b53410270e1a8e97065bf2c04decdeece555762b6834dd20366aa4b75586a6dcdb6616f7b004d8ff429f3681d862bc2bdf

    • SSDEEP

      49152:CG6rYHQQFDut9t96xHVur1h63EuHenNMZ+Kzi:q8HQSosHM63EEWNMvzi

    • Modifies WinLogon for persistence

    • RevcodeRat, WebMonitorRat

      WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.

    • WebMonitor payload

    • Webmonitor family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks