General

  • Target

    JaffaCakes118_5b2d984710d2275aafb93fcfceee2f3c

  • Size

    1.7MB

  • Sample

    250115-s6a6kaylej

  • MD5

    5b2d984710d2275aafb93fcfceee2f3c

  • SHA1

    7ffbef16038a693407182a3acebfd6dbad2f098d

  • SHA256

    22ecc18602dc4d604f34ae08f83b6c3e3e9fb7aa4d0d06844cff8e3925c79521

  • SHA512

    02b93299cf39ce4773e5f84e4cee1b3f3e5b44a0332482f90cbb03b365708722c8e1cebc523f8627d49dc59c4d5fe0b3ab3658ca66df34c4d8e0b36162cf4edc

  • SSDEEP

    24576:97AnB5GaUEMm6S9j5nWT1zU9uWIMS06Pn6K+ZSq7pm2rhqmN4dWQVhhlZo6rOWgt:mFUrm6S9ATFUNcbn2F9/NGWOO6rufjZ

Malware Config

Targets

    • Target

      JaffaCakes118_5b2d984710d2275aafb93fcfceee2f3c

    • Size

      1.7MB

    • MD5

      5b2d984710d2275aafb93fcfceee2f3c

    • SHA1

      7ffbef16038a693407182a3acebfd6dbad2f098d

    • SHA256

      22ecc18602dc4d604f34ae08f83b6c3e3e9fb7aa4d0d06844cff8e3925c79521

    • SHA512

      02b93299cf39ce4773e5f84e4cee1b3f3e5b44a0332482f90cbb03b365708722c8e1cebc523f8627d49dc59c4d5fe0b3ab3658ca66df34c4d8e0b36162cf4edc

    • SSDEEP

      24576:97AnB5GaUEMm6S9j5nWT1zU9uWIMS06Pn6K+ZSq7pm2rhqmN4dWQVhhlZo6rOWgt:mFUrm6S9ATFUNcbn2F9/NGWOO6rufjZ

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      $LOCALAPPDATA/funmoods.exe

    • Size

      1.6MB

    • MD5

      e10aa65bc9f094483b45ee6745e89606

    • SHA1

      f69007d78c2636c53afe608f9eb8d116603652f7

    • SHA256

      5211d85e3d577f54134a8ab8c5c9f23bd3b7332825dcab75a19258b25790b37f

    • SHA512

      b7c55c05f53bcac6d077cdd69c37459f3e3a39c719489d7027d16d87eea96479f7baaedb31f4a7b2e0a39aba872b6435be6dd7fcdce66d42a94c87ed2b49cba6

    • SSDEEP

      24576:MYl7Umdm6GUyZ2WmMFUxOWjgS0doedK+sSJBtQ2YJqrNzyWNxhxgj:5UQm6GUym0UR3tenXEYN+Wkj

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Target

      $PLUGINSDIR/ExtractDLLEx.dll

    • Size

      7KB

    • MD5

      ba4063f437abb349aa9120e9c320c467

    • SHA1

      b045d785f6041e25d6be031ae2af4d4504e87b12

    • SHA256

      73acba7dd477dfd6cf4249911f4e3c781196c7cf6b28425761dcb2d4f90c36c5

    • SHA512

      48a813f55834069f8c6b90740de3df01564a136b0fe637f9f85cc1a19d7f32b1f70205ff2462526508fe3c1962d7c1e8e384c40463e328538aeba28e8d0fb92a

    • SSDEEP

      96:lyEPmi/06iLbX8SIP59L1MmqPbgkk/eWKCHGojGYYIF/ggiomsTeZUzI:lyEPmymbMbPZOz+/eWJmoUItiopTeZ

    Score
    3/10
    • Target

      $PLUGINSDIR/IEFunctions.dll

    • Size

      7KB

    • MD5

      5a3a8d916dd0071f16d217bbcfe7d047

    • SHA1

      c2265fa5cec491706d0921e4274c674b693f326f

    • SHA256

      465e81022be2df0433a6e02d427a79dc733031abc89d99746b73576a976857e3

    • SHA512

      8908ee2e329171d2ee430aacf7f86be565472cdb9b338786188ab37d6e6a714e5bc98552a39737ff8a5f314730c9f351aa0f1fa8207eff32289d7bccb3e05a08

    • SSDEEP

      96:GibIzePROHQWH6hhawoA8Blnw4npQhrfgWV6R6CtqLZ:GibcXvScwoAMlnw4npkroWV6RN4

    Score
    3/10
    • Target

      $PLUGINSDIR/InetLoad.dll

    • Size

      18KB

    • MD5

      994669c5737b25c26642c94180e92fa2

    • SHA1

      d8a1836914a446b0e06881ce1be8631554adafde

    • SHA256

      bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c

    • SHA512

      d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563

    • SSDEEP

      384:nUOPTbiJmdztwwKq8W1cyMjPzV0Ac9k+LMkIX1+Gn+XHdjf:nTikliwKq8W1rMjPzz+f

    Score
    3/10
    • Target

      $PLUGINSDIR/NSISdl.dll

    • Size

      14KB

    • MD5

      a5f8399a743ab7f9c88c645c35b1ebb5

    • SHA1

      168f3c158913b0367bf79fa413357fbe97018191

    • SHA256

      dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    • SHA512

      824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

    • SSDEEP

      192:tUZTobBDJ68r67wmsvJI5ad9cXzFOVu+mZ/P3p+57CvpVqDxVp01Dwn2GRPgsfA:6Bo/680dCI5adOjFOg9//p27uNw2Go

    Score
    3/10
    • Target

      $PLUGINSDIR/Processes.dll

    • Size

      56KB

    • MD5

      cc0bd4f5a79107633084471dbd4af796

    • SHA1

      09dfcf182b1493161dec8044a5234c35ee24c43a

    • SHA256

      3b5388e13dab53d53e08791f492ed7d3094a0cee51e9841af83ce02534e0621c

    • SHA512

      67ba90ec04366e07d0922ffb4dbbb4f12f90b6785b87700adaae29327db9ec2a03d750b229f858db0594f439499d6346fbf1ebc17c77162bf8da027515219ee3

    • SSDEEP

      768:WmswCIbuzwEmd7Fp4KpDAKngV9tV3rJy63JgaVwoz7si4uYqUYWu1gYwmj552RFB:WmswCIbuzwEy7n3YD3Jgw7shKrp55io

    Score
    3/10
    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      c17103ae9072a06da581dec998343fc1

    • SHA1

      b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    • SHA256

      dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    • SHA512

      d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

    • SSDEEP

      192:7DKnJZCv6VmbJQC+tFiUdK7ckD4gRXKQx+LQ2CSF:7ViJrtFRdbmXK8+PCw

    Score
    3/10
    • Target

      $PLUGINSDIR/Time.dll

    • Size

      10KB

    • MD5

      38977533750fe69979b2c2ac801f96e6

    • SHA1

      74643c30cda909e649722ed0c7f267903558e92a

    • SHA256

      b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35

    • SHA512

      e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53

    • SSDEEP

      192:oNcwTweFbs9t2n2Sgiga65/aHdaGZavaJIYX4Hw2:oNcwBFg22SEw47CPU

    Score
    3/10
    • Target

      $PLUGINSDIR/UserInfo.dll

    • Size

      4KB

    • MD5

      7579ade7ae1747a31960a228ce02e666

    • SHA1

      8ec8571a296737e819dcf86353a43fcf8ec63351

    • SHA256

      564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    • SHA512

      a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

    Score
    3/10
    • Target

      $PLUGINSDIR/chrmPref.dll

    • Size

      193KB

    • MD5

      57d63d48f0bb2fe9b3751342e1b0cc67

    • SHA1

      65afbce77b4990f7f5efb5251e90bd9cc744583c

    • SHA256

      72753db55778180ebd90cb10173c7a87d8d919c6b34a07962e7e1fff80092eab

    • SHA512

      5766ff289869a252a9d08fe826e9e7df70796b2faddb470898e4f710aa33ed19094bd73e6637c9c720da417e7f5b9ca7645fa7cd36a8fae2b0718ced10892cf8

    • SSDEEP

      3072:HmRDL50AQeCDIypwn6etemPWamO52oZyl2dNxxyDm/Dd/tiPU6t:HmRDyAQeYYIXOQokKxxImH

    Score
    3/10
    • Target

      $PLUGINSDIR/mt.dll

    • Size

      5KB

    • MD5

      aac69f856c4540edd4ef7ce6c8571639

    • SHA1

      2860f55ea9774d631219e66604051e90a43258b7

    • SHA256

      6dc2644a389feeef9e0ac65e2c8b01fc18ca6e53b253f10efffcb117e0a852dd

    • SHA512

      ebacc8117c44d298ae519705510285c576932761b3c7b697eeb91cb7620150ebe551102d1ab83d68f4c78e1496b191a55ad8f78c491f5b4af456c4de6ad72dcd

    • SSDEEP

      48:am+jZiVMdzNNqdugTvfbAMHpyncQk7IZigYyPSx1A8v1XlWzNKjW1Qg/BTv:zKiVMdhwr7k0pycQBZtJuA8vUQi1QkN

    Score
    3/10
    • Target

      $PLUGINSDIR/nsisos.dll

    • Size

      5KB

    • MD5

      69806691d649ef1c8703fd9e29231d44

    • SHA1

      e2193fcf5b4863605eec2a5eb17bf84c7ac00166

    • SHA256

      ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6

    • SHA512

      5e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb

    • SSDEEP

      48:6EyuygeHCfxwU5x+6kx/k1gONv27oBc2OkIrHHl:VeHCf2762kKsu7oGjkIrn

    Score
    3/10
    • Target

      FM4ffx.exe

    • Size

      314KB

    • MD5

      a6ea8baf987c05383013259a3a96b221

    • SHA1

      dc1f3df6abd8b9fa1a3d364e9021cd5f62590f9f

    • SHA256

      d978712e92d634c150493e35f7dab39483559350914c1a302c0b2c0aaf1c47a3

    • SHA512

      0e6200677efff5a9e2babd8ebac1aba3c32a1f4de0251ba2036b6bd0996170777de40ba5df6e933e0b89fbdf8cc4709d09cd077016c83018d9e338a37b63b277

    • SSDEEP

      6144:He34G2cYkBUQf/5yT2x/lN4VOejFepSBmiBmXOf4b2EDGwyo:WY6fRym/lNcjFeMmymXOAK2

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Target

      $PLUGINSDIR/NSISdl.dll

    • Size

      14KB

    • MD5

      a5f8399a743ab7f9c88c645c35b1ebb5

    • SHA1

      168f3c158913b0367bf79fa413357fbe97018191

    • SHA256

      dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    • SHA512

      824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

    • SSDEEP

      192:tUZTobBDJ68r67wmsvJI5ad9cXzFOVu+mZ/P3p+57CvpVqDxVp01Dwn2GRPgsfA:6Bo/680dCI5adOjFOg9//p27uNw2Go

    Score
    3/10
    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      c17103ae9072a06da581dec998343fc1

    • SHA1

      b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    • SHA256

      dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    • SHA512

      d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

    • SSDEEP

      192:7DKnJZCv6VmbJQC+tFiUdK7ckD4gRXKQx+LQ2CSF:7ViJrtFRdbmXK8+PCw

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks

static1

upx
Score
7/10

behavioral1

adwarediscoveryspywarestealerupx
Score
7/10

behavioral2

adwarediscoveryspywarestealerupx
Score
7/10

behavioral3

adwarediscoveryspywarestealer
Score
7/10

behavioral4

adwarediscoveryspywarestealer
Score
7/10

behavioral5

discovery
Score
3/10

behavioral6

discovery
Score
3/10

behavioral7

discovery
Score
3/10

behavioral8

discovery
Score
3/10

behavioral9

discovery
Score
3/10

behavioral10

discovery
Score
3/10

behavioral11

discovery
Score
3/10

behavioral12

discovery
Score
3/10

behavioral13

discovery
Score
3/10

behavioral14

discovery
Score
3/10

behavioral15

discovery
Score
3/10

behavioral16

discovery
Score
3/10

behavioral17

discovery
Score
3/10

behavioral18

discovery
Score
3/10

behavioral19

discovery
Score
3/10

behavioral20

discovery
Score
3/10

behavioral21

discovery
Score
3/10

behavioral22

discovery
Score
3/10

behavioral23

discovery
Score
3/10

behavioral24

discovery
Score
3/10

behavioral25

discovery
Score
3/10

behavioral26

discovery
Score
3/10

behavioral27

discoveryspywarestealer
Score
7/10

behavioral28

discoveryspywarestealer
Score
7/10

behavioral29

discovery
Score
3/10

behavioral30

discovery
Score
3/10

behavioral31

discovery
Score
3/10

behavioral32

discovery
Score
3/10