General

  • Target

    1bc55516337fbd792bca179ba6a37701_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240701-vennpaygmg

  • MD5

    1bc55516337fbd792bca179ba6a37701

  • SHA1

    3af2f89be985f16eaace6d82bd69aa313ae70565

  • SHA256

    3d377a53698e96b46952bc7aed2024a577833bb9a3d7922b01a77f07490155d7

  • SHA512

    129944a2d4a7318f382b6ddcc09c9865b45825e17661562700a56ad4019b613fc5088c5409ba3b25a4f0ddada7679eb753af6e03e5c9f3129eabf22259dbdfa7

  • SSDEEP

    3072:0RsBiWyDJP1j11BJIcBzeFxFtMuqnBJIF+DbCu/bU+99:QxRJPnJwMu6dXCsQi

Malware Config

Targets

    • Target

      1bc55516337fbd792bca179ba6a37701_JaffaCakes118

    • Size

      2.2MB

    • MD5

      1bc55516337fbd792bca179ba6a37701

    • SHA1

      3af2f89be985f16eaace6d82bd69aa313ae70565

    • SHA256

      3d377a53698e96b46952bc7aed2024a577833bb9a3d7922b01a77f07490155d7

    • SHA512

      129944a2d4a7318f382b6ddcc09c9865b45825e17661562700a56ad4019b613fc5088c5409ba3b25a4f0ddada7679eb753af6e03e5c9f3129eabf22259dbdfa7

    • SSDEEP

      3072:0RsBiWyDJP1j11BJIcBzeFxFtMuqnBJIF+DbCu/bU+99:QxRJPnJwMu6dXCsQi

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Active Setup

1
T1547.014

Browser Extensions

1
T1176

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Active Setup

1
T1547.014

Defense Evasion

Modify Registry

5
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

1
T1552.001

Credentials in Registry

1
T1552.002

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks