General

  • Target

    1324cbd3aec231c8c8e7c4444b4c55bf_JaffaCakes118

  • Size

    520KB

  • Sample

    240626-x31z2ayhnh

  • MD5

    1324cbd3aec231c8c8e7c4444b4c55bf

  • SHA1

    75c52eba09098041c901a742a3fafe33c82cae28

  • SHA256

    bccc6abd86e962fafe59f64557f8e33c76ca41c91e610f2879c03c8139046d19

  • SHA512

    0f74984f5c936636f7d2f409ac277ec4bc6f9849dc4dc51c019e4f619f7b56c46aa54f0a0702b118aa8c2b7fe40e5ec30a51c2927e0c85ed928337f853177b3f

  • SSDEEP

    12288:IuQR86TZUJgushyTe3Chl9rxdk0ERno19p2N5188AUmxpXu3TdYZZZZ:IuQfTZUJgushh3Cn9ldUY9Qr18TxETO3

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      1324cbd3aec231c8c8e7c4444b4c55bf_JaffaCakes118

    • Size

      520KB

    • MD5

      1324cbd3aec231c8c8e7c4444b4c55bf

    • SHA1

      75c52eba09098041c901a742a3fafe33c82cae28

    • SHA256

      bccc6abd86e962fafe59f64557f8e33c76ca41c91e610f2879c03c8139046d19

    • SHA512

      0f74984f5c936636f7d2f409ac277ec4bc6f9849dc4dc51c019e4f619f7b56c46aa54f0a0702b118aa8c2b7fe40e5ec30a51c2927e0c85ed928337f853177b3f

    • SSDEEP

      12288:IuQR86TZUJgushyTe3Chl9rxdk0ERno19p2N5188AUmxpXu3TdYZZZZ:IuQfTZUJgushh3Cn9ldUY9Qr18TxETO3

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

Tasks