General

  • Target

    JaffaCakes118_9620b1b570b74a13d14613e3d35d68e0

  • Size

    1.4MB

  • Sample

    250329-yk4tmsymt7

  • MD5

    9620b1b570b74a13d14613e3d35d68e0

  • SHA1

    8e69d837a34ff6eb34e05969fe82300e50433127

  • SHA256

    2029d8b7a71aff162ebb50e2b73d695003c92d080d5f1b355ffbbc2c3495d80d

  • SHA512

    e57426a189c83da0fada381678e611c6ba0803d6ad159ef02d385a40b57dfd11e052eb0b9dde7860c7b7514009d30b48c7d20c42095140b31ee6ee3b1669bcf1

  • SSDEEP

    24576:L7WsPkA8QsBPyoG0HBrC2zJSKDAULsKlbw9FTWwb:LrEQsBT1DAOn29F3b

Malware Config

Targets

    • Target

      JaffaCakes118_9620b1b570b74a13d14613e3d35d68e0

    • Size

      1.4MB

    • MD5

      9620b1b570b74a13d14613e3d35d68e0

    • SHA1

      8e69d837a34ff6eb34e05969fe82300e50433127

    • SHA256

      2029d8b7a71aff162ebb50e2b73d695003c92d080d5f1b355ffbbc2c3495d80d

    • SHA512

      e57426a189c83da0fada381678e611c6ba0803d6ad159ef02d385a40b57dfd11e052eb0b9dde7860c7b7514009d30b48c7d20c42095140b31ee6ee3b1669bcf1

    • SSDEEP

      24576:L7WsPkA8QsBPyoG0HBrC2zJSKDAULsKlbw9FTWwb:LrEQsBT1DAOn29F3b

    • Modifies WinLogon for persistence

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies WinLogon

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks