General

  • Target

    1b9b5561e39793938c602e4d0803a314_JaffaCakes118

  • Size

    195KB

  • Sample

    240701-rkl59swcpa

  • MD5

    1b9b5561e39793938c602e4d0803a314

  • SHA1

    c311049f4821100c92c1de4610a6dfceae4a7e95

  • SHA256

    bbe79d51fc08ea32080aa96b1bcfacc1d3f26e061322f9b44ed4ec0c02370042

  • SHA512

    521f6dd98a6ab6af7ac9ccbbda46be2f8257177100bbc11138da7a4c1a3323c81c5d27c66a6c7021e9f4c425bbf6fa9481ed7e2fc5a04d9ea6c70c9a389d5506

  • SSDEEP

    6144:ffw998aN22pAouklicakJeHkFgz4jv6BB+T:Hw9UKFlHmI6BoT

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      1b9b5561e39793938c602e4d0803a314_JaffaCakes118

    • Size

      195KB

    • MD5

      1b9b5561e39793938c602e4d0803a314

    • SHA1

      c311049f4821100c92c1de4610a6dfceae4a7e95

    • SHA256

      bbe79d51fc08ea32080aa96b1bcfacc1d3f26e061322f9b44ed4ec0c02370042

    • SHA512

      521f6dd98a6ab6af7ac9ccbbda46be2f8257177100bbc11138da7a4c1a3323c81c5d27c66a6c7021e9f4c425bbf6fa9481ed7e2fc5a04d9ea6c70c9a389d5506

    • SSDEEP

      6144:ffw998aN22pAouklicakJeHkFgz4jv6BB+T:Hw9UKFlHmI6BoT

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks