General

  • Target

    1a35caea333db3be203aa25000987fb4_JaffaCakes118

  • Size

    60KB

  • Sample

    240628-p756jstdmn

  • MD5

    1a35caea333db3be203aa25000987fb4

  • SHA1

    78e9e37bdd53fca3e22adf6d4c5824f8d25fa183

  • SHA256

    ac2afda9e5df38f43680fc64b6718167593d940d9c1986037d128b459f42c327

  • SHA512

    eef8a1f6ee8838aa2cd87f91df2bfca6e6033ec95a8328de9c6578ff2326ab5381c7de597d9874664688e1a83a9dbf31d14b99135b70d479155afffb98abab75

  • SSDEEP

    1536:iJiYU3BupCdtWMrd4IJfzc5TOtnVxhxMU:iJil3BaCdtWxSLMTOtVxgU

Malware Config

Targets

    • Target

      1a35caea333db3be203aa25000987fb4_JaffaCakes118

    • Size

      60KB

    • MD5

      1a35caea333db3be203aa25000987fb4

    • SHA1

      78e9e37bdd53fca3e22adf6d4c5824f8d25fa183

    • SHA256

      ac2afda9e5df38f43680fc64b6718167593d940d9c1986037d128b459f42c327

    • SHA512

      eef8a1f6ee8838aa2cd87f91df2bfca6e6033ec95a8328de9c6578ff2326ab5381c7de597d9874664688e1a83a9dbf31d14b99135b70d479155afffb98abab75

    • SSDEEP

      1536:iJiYU3BupCdtWMrd4IJfzc5TOtnVxhxMU:iJil3BaCdtWxSLMTOtVxgU

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Privilege Escalation

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks