General

  • Target

    JaffaCakes118_b4ef121242f51317028b4e1340a39dfa

  • Size

    104KB

  • Sample

    250118-z9wd8svmgw

  • MD5

    b4ef121242f51317028b4e1340a39dfa

  • SHA1

    44093b5600f754f5b4b9a7d01d638f727201c83f

  • SHA256

    1c16c326b5a46758e822b6cc755d8a48b4ff02b05061fd7e1f39deca629321fd

  • SHA512

    aa04ff289ce70ad9006efcc2354c92fe95b3603263f294f5f715e8874fbb6c181ba773098162b41c79ae150a41705200e2bb713ac953b9f8904f621830efb039

  • SSDEEP

    3072:mdkoV4I2VK/Jmp6Gb+eCDgb3GmT2Bb5jwaaHw7Koj4rG:gVR2VK/46GQ8gX

Malware Config

Targets

    • Target

      JaffaCakes118_b4ef121242f51317028b4e1340a39dfa

    • Size

      104KB

    • MD5

      b4ef121242f51317028b4e1340a39dfa

    • SHA1

      44093b5600f754f5b4b9a7d01d638f727201c83f

    • SHA256

      1c16c326b5a46758e822b6cc755d8a48b4ff02b05061fd7e1f39deca629321fd

    • SHA512

      aa04ff289ce70ad9006efcc2354c92fe95b3603263f294f5f715e8874fbb6c181ba773098162b41c79ae150a41705200e2bb713ac953b9f8904f621830efb039

    • SSDEEP

      3072:mdkoV4I2VK/Jmp6Gb+eCDgb3GmT2Bb5jwaaHw7Koj4rG:gVR2VK/46GQ8gX

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks