General

  • Target

    JaffaCakes118_f9f1cdc7f145d56a9920d2f321f7c6f7

  • Size

    338KB

  • Sample

    250111-hkqn1sskdp

  • MD5

    f9f1cdc7f145d56a9920d2f321f7c6f7

  • SHA1

    450dc6efd70aa8dbbf80039c55d34defac8dd0e1

  • SHA256

    0935256af18eb15416e954235f1bf5d0acb12f21a933eb29174e34fe3565768a

  • SHA512

    e8eb36e4669e9634509938169ceaa7effaac514485b8512d97a012b7109834b375517a957c0654618bc82f63f6c7ee84500ed157361e3966e7812304eaa3552e

  • SSDEEP

    6144:Sbiz52dlKg1b5/hQHq5EHx+a7Xo1wU6bJSIXOGPBgFNVh1:SLdlKg1b5iq5EhM1wU6bvPOVh1

Malware Config

Targets

    • Target

      JaffaCakes118_f9f1cdc7f145d56a9920d2f321f7c6f7

    • Size

      338KB

    • MD5

      f9f1cdc7f145d56a9920d2f321f7c6f7

    • SHA1

      450dc6efd70aa8dbbf80039c55d34defac8dd0e1

    • SHA256

      0935256af18eb15416e954235f1bf5d0acb12f21a933eb29174e34fe3565768a

    • SHA512

      e8eb36e4669e9634509938169ceaa7effaac514485b8512d97a012b7109834b375517a957c0654618bc82f63f6c7ee84500ed157361e3966e7812304eaa3552e

    • SSDEEP

      6144:Sbiz52dlKg1b5/hQHq5EHx+a7Xo1wU6bJSIXOGPBgFNVh1:SLdlKg1b5iq5EhM1wU6bvPOVh1

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks