General

  • Target

    19c9ebb9f0f15b7a84db4101836656f0_JaffaCakes118

  • Size

    60KB

  • Sample

    240628-mh2eysvarf

  • MD5

    19c9ebb9f0f15b7a84db4101836656f0

  • SHA1

    46c5854345e6ecefd5b3ff5825bb785007e76782

  • SHA256

    474f13805ec346c7514fb92dc35ab449848da6a3f1152ef6104ffc8f46c6c364

  • SHA512

    650f6a3be208f85395faaab34533d209cb7f8cdd6dd5dffbbfbfdaf6d0a370022dc4f1d6aa37089e1675fbb97bffb28d5f10f1b79ea68207baa0635950398c1f

  • SSDEEP

    1536:3JiYU3BtpCdtWMrd4IJfzc5TOtnVxhxMU:3Jil3BHCdtWxSLMTOtVxgU

Malware Config

Targets

    • Target

      19c9ebb9f0f15b7a84db4101836656f0_JaffaCakes118

    • Size

      60KB

    • MD5

      19c9ebb9f0f15b7a84db4101836656f0

    • SHA1

      46c5854345e6ecefd5b3ff5825bb785007e76782

    • SHA256

      474f13805ec346c7514fb92dc35ab449848da6a3f1152ef6104ffc8f46c6c364

    • SHA512

      650f6a3be208f85395faaab34533d209cb7f8cdd6dd5dffbbfbfdaf6d0a370022dc4f1d6aa37089e1675fbb97bffb28d5f10f1b79ea68207baa0635950398c1f

    • SSDEEP

      1536:3JiYU3BtpCdtWMrd4IJfzc5TOtnVxhxMU:3Jil3BHCdtWxSLMTOtVxgU

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Privilege Escalation

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks