General

  • Target

    15f7e1121ab14c9f10f48b1aadd47f5e_JaffaCakes118

  • Size

    173KB

  • Sample

    240627-petl2stapj

  • MD5

    15f7e1121ab14c9f10f48b1aadd47f5e

  • SHA1

    f3ee40a6b421e128ba44af005dddac20bcd47936

  • SHA256

    081c7d809931e53f6ef41662e06ed4bcbe8e222c6a18565bed461efd444d3360

  • SHA512

    252c8cb5425858631f9f40314b61e86d502d60566d6bea3fa6a4839974396022f01bfb04c5135637fd33331242f8da738dbb59ae0189188396367c964511b11f

  • SSDEEP

    3072:jCOeDHj6J+1LPz9D+ydlXOw2Ews0DOEK6EYck0soq11o35N30tU/caQJ:+OenLPz9DbRGEz0zCq1yHkticaW

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      15f7e1121ab14c9f10f48b1aadd47f5e_JaffaCakes118

    • Size

      173KB

    • MD5

      15f7e1121ab14c9f10f48b1aadd47f5e

    • SHA1

      f3ee40a6b421e128ba44af005dddac20bcd47936

    • SHA256

      081c7d809931e53f6ef41662e06ed4bcbe8e222c6a18565bed461efd444d3360

    • SHA512

      252c8cb5425858631f9f40314b61e86d502d60566d6bea3fa6a4839974396022f01bfb04c5135637fd33331242f8da738dbb59ae0189188396367c964511b11f

    • SSDEEP

      3072:jCOeDHj6J+1LPz9D+ydlXOw2Ews0DOEK6EYck0soq11o35N30tU/caQJ:+OenLPz9DbRGEz0zCq1yHkticaW

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks