General

  • Target

    1bfa2bcd09f8fdf25eb6599f995b6854_JaffaCakes118

  • Size

    274KB

  • Sample

    240701-wnhpga1glh

  • MD5

    1bfa2bcd09f8fdf25eb6599f995b6854

  • SHA1

    44e3b59790bccbb8650f5115bb07f4dd4b3bab60

  • SHA256

    de04393109575f0710d6f61a4076d5c7c9cdf763c8d3ce6db7f0a6ef0beebda6

  • SHA512

    1190793d21714602dbf5fd496add3407f2944e9596e616a99c3025cb1ff27bb2e8390ca7dd696705a163cfae29781407b3071d3ee7fa57840faaf8f014801faa

  • SSDEEP

    6144:OenFgacc+pFf+q0Pj52cuaZf/EFpkXsDePGaqqqBmMfujPu:OenFlcc+pFYLuO/UDQGEQuC

Malware Config

Targets

    • Target

      1bfa2bcd09f8fdf25eb6599f995b6854_JaffaCakes118

    • Size

      274KB

    • MD5

      1bfa2bcd09f8fdf25eb6599f995b6854

    • SHA1

      44e3b59790bccbb8650f5115bb07f4dd4b3bab60

    • SHA256

      de04393109575f0710d6f61a4076d5c7c9cdf763c8d3ce6db7f0a6ef0beebda6

    • SHA512

      1190793d21714602dbf5fd496add3407f2944e9596e616a99c3025cb1ff27bb2e8390ca7dd696705a163cfae29781407b3071d3ee7fa57840faaf8f014801faa

    • SSDEEP

      6144:OenFgacc+pFf+q0Pj52cuaZf/EFpkXsDePGaqqqBmMfujPu:OenFlcc+pFYLuO/UDQGEQuC

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Modify Registry

4
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Safe Mode Boot

1
T1562.009

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks