General

  • Target

    1385219d6368deca2b4c8ffd47c7b612_JaffaCakes118

  • Size

    836KB

  • Sample

    240626-1axzfsvdkf

  • MD5

    1385219d6368deca2b4c8ffd47c7b612

  • SHA1

    073faff2cc9d76b85c1339d9a308977b1d3bacf5

  • SHA256

    53b3aca10dfc6f7bf1c0349f0b98babf5d0d1a584ac6b10369e2b7ac054a99dd

  • SHA512

    e31cff07e9dfc3b7ee7a1b38066408826da17ffde23e363667f4de61bbcd99c000a346df7ae7bd3c4f19eddcc2fc029553f60f4858d2236afb7759729656a375

  • SSDEEP

    24576:GSs2UOty0TrfVSDBeJjmHSMSICMWDbUdn:bTOexSYD0

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      1385219d6368deca2b4c8ffd47c7b612_JaffaCakes118

    • Size

      836KB

    • MD5

      1385219d6368deca2b4c8ffd47c7b612

    • SHA1

      073faff2cc9d76b85c1339d9a308977b1d3bacf5

    • SHA256

      53b3aca10dfc6f7bf1c0349f0b98babf5d0d1a584ac6b10369e2b7ac054a99dd

    • SHA512

      e31cff07e9dfc3b7ee7a1b38066408826da17ffde23e363667f4de61bbcd99c000a346df7ae7bd3c4f19eddcc2fc029553f60f4858d2236afb7759729656a375

    • SSDEEP

      24576:GSs2UOty0TrfVSDBeJjmHSMSICMWDbUdn:bTOexSYD0

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks