General

  • Target

    18e41b228d28d7cbb9294841949c2b29_JaffaCakes118

  • Size

    166KB

  • Sample

    240628-ftnvnssgla

  • MD5

    18e41b228d28d7cbb9294841949c2b29

  • SHA1

    4ee10ba4a622d814467d4c1aa2aea36716862712

  • SHA256

    809fcf5cb8b5971cff924d2bd7f8bd7bc444d8fd9952af885a7757ee6f7a61bf

  • SHA512

    91a83e337b7aac32834158ad335cbef66eeb0a145a4c15d61ab70e949769b42423487e468c90f8366a9bf7ef0b2643f2e3a8c5cca92eabe865d2bc5f0ed90a6e

  • SSDEEP

    3072:6IWSh1B+GAbubWLwh3vJJS+LIFGoBwAExWi1tXfiIEfi3zXfESW18+:6bSPyuRh3h1kwW+V1tXfbSIa8+

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      18e41b228d28d7cbb9294841949c2b29_JaffaCakes118

    • Size

      166KB

    • MD5

      18e41b228d28d7cbb9294841949c2b29

    • SHA1

      4ee10ba4a622d814467d4c1aa2aea36716862712

    • SHA256

      809fcf5cb8b5971cff924d2bd7f8bd7bc444d8fd9952af885a7757ee6f7a61bf

    • SHA512

      91a83e337b7aac32834158ad335cbef66eeb0a145a4c15d61ab70e949769b42423487e468c90f8366a9bf7ef0b2643f2e3a8c5cca92eabe865d2bc5f0ed90a6e

    • SSDEEP

      3072:6IWSh1B+GAbubWLwh3vJJS+LIFGoBwAExWi1tXfiIEfi3zXfESW18+:6bSPyuRh3h1kwW+V1tXfbSIa8+

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks