General

  • Target

    fff7c1f77588105fc5a76b841983253f_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240421-xtqspshf98

  • MD5

    fff7c1f77588105fc5a76b841983253f

  • SHA1

    c87d3d2cf8d649d9e0cd045f28d6972fc1ab9edb

  • SHA256

    39ec80621b9b8fcefe89e543622c4263b7629a1207107bebd239a50124bb7fc7

  • SHA512

    a23e67eb352dc383e56ad422708ea74165d294925d57b08d24d937d7bf90f6e49d5768d18f3de2cf479b57c6bd710c786e3ea4f6dc0b77851d73aab021dce6c7

  • SSDEEP

    49152:xcBGvy10E+QMWcLctpCOOeWAbaW44EwJ84vLRaBtIl9mTRP+m+OJz:xb4MWcApaeW9FvCvLUBsKRPUkz

Malware Config

Extracted

Family

nullmixer

C2

http://wxkeww.xyz/

Targets

    • Target

      fff7c1f77588105fc5a76b841983253f_JaffaCakes118

    • Size

      1.9MB

    • MD5

      fff7c1f77588105fc5a76b841983253f

    • SHA1

      c87d3d2cf8d649d9e0cd045f28d6972fc1ab9edb

    • SHA256

      39ec80621b9b8fcefe89e543622c4263b7629a1207107bebd239a50124bb7fc7

    • SHA512

      a23e67eb352dc383e56ad422708ea74165d294925d57b08d24d937d7bf90f6e49d5768d18f3de2cf479b57c6bd710c786e3ea4f6dc0b77851d73aab021dce6c7

    • SSDEEP

      49152:xcBGvy10E+QMWcLctpCOOeWAbaW44EwJ84vLRaBtIl9mTRP+m+OJz:xb4MWcApaeW9FvCvLUBsKRPUkz

    • Modifies Windows Defender Real-time Protection settings

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

1
T1112

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks