General

  • Target

    0fdf328426ecf86ef63b76949fd208fc_JaffaCakes118

  • Size

    598KB

  • Sample

    240625-25grdssamr

  • MD5

    0fdf328426ecf86ef63b76949fd208fc

  • SHA1

    4e1c12e0108a6e82ab112e618cd1cde5eb04cbf2

  • SHA256

    0592fd7640b20937bb288c44e06d924daa1e3397f55b54440a7c12e7979d8e48

  • SHA512

    4b669582aece23c54c95b3cb5e4f077849e13e4b2aff323a010fa4f0a7aa0d025feadeb76385857a0269c5730877ccc3cdbec529d2fad915efcedea013871f08

  • SSDEEP

    6144:twwD6UiF6ojFnFeVZLHrwwDgUiF6ojFnFeVZL8+nOj0FZOUxku0GzTVowvYy:mC44UefsCu4UefFVXTmRy

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    283105420

Targets

    • Target

      0fdf328426ecf86ef63b76949fd208fc_JaffaCakes118

    • Size

      598KB

    • MD5

      0fdf328426ecf86ef63b76949fd208fc

    • SHA1

      4e1c12e0108a6e82ab112e618cd1cde5eb04cbf2

    • SHA256

      0592fd7640b20937bb288c44e06d924daa1e3397f55b54440a7c12e7979d8e48

    • SHA512

      4b669582aece23c54c95b3cb5e4f077849e13e4b2aff323a010fa4f0a7aa0d025feadeb76385857a0269c5730877ccc3cdbec529d2fad915efcedea013871f08

    • SSDEEP

      6144:twwD6UiF6ojFnFeVZLHrwwDgUiF6ojFnFeVZL8+nOj0FZOUxku0GzTVowvYy:mC44UefsCu4UefFVXTmRy

    Score
    10/10
    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks