General

  • Target

    JaffaCakes118_b928baf3d7edb8bae41b67c2a0d1ea5f

  • Size

    205KB

  • Sample

    250415-bkczlawjv6

  • MD5

    b928baf3d7edb8bae41b67c2a0d1ea5f

  • SHA1

    5bfb3d9fc214d4149a6b68f1b444a520da517173

  • SHA256

    9c60daa7faa2084ef86e196d45a0647e0b83c96676d9e014b8b3b6e240e52f7c

  • SHA512

    b3e9494e5957a3d3357b4a7fc190173c366df8cb7c0491763db2ee04cc6764efb8bfe6ca6d3abd0ec154bc71143e4984376741c57d8e19f11d4b9b3a1ea66d64

  • SSDEEP

    6144:aOxDjWfP3Lz2pA9QZzUMiPzDLXtdCp51I:xxDjWffLz2a9CXOZcpc

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      JaffaCakes118_b928baf3d7edb8bae41b67c2a0d1ea5f

    • Size

      205KB

    • MD5

      b928baf3d7edb8bae41b67c2a0d1ea5f

    • SHA1

      5bfb3d9fc214d4149a6b68f1b444a520da517173

    • SHA256

      9c60daa7faa2084ef86e196d45a0647e0b83c96676d9e014b8b3b6e240e52f7c

    • SHA512

      b3e9494e5957a3d3357b4a7fc190173c366df8cb7c0491763db2ee04cc6764efb8bfe6ca6d3abd0ec154bc71143e4984376741c57d8e19f11d4b9b3a1ea66d64

    • SSDEEP

      6144:aOxDjWfP3Lz2pA9QZzUMiPzDLXtdCp51I:xxDjWffLz2a9CXOZcpc

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks