General

  • Target

    e96dbde934e068285ea1959a4793663a_JaffaCakes118

  • Size

    373KB

  • Sample

    240409-hyz5lsce3x

  • MD5

    e96dbde934e068285ea1959a4793663a

  • SHA1

    f2bfa5c9982691f9e46553899f27e9dd7ff6d2d1

  • SHA256

    f357668862a1af4f388eeca8868bd3c502d2a51ac80a9c8c4f92d4c61247769b

  • SHA512

    ca2896f04b19a570302be17dc6997c03672c8dfb051b8dfae256a1ba4da550691801ae154ec8e38a740327215c82b2195bf5eef4d476f4ce3f4462a6bce728f6

  • SSDEEP

    6144:o6enNkfdjqKveug2LohOGYw6CC5jTT453mjEIbWiGVAKSLFN+YInSCRvuPsxNTA:XeNgWKGuHL2OGY/TTy2jEIJc6FNu3uPL

Score
10/10

Malware Config

Targets

    • Target

      e96dbde934e068285ea1959a4793663a_JaffaCakes118

    • Size

      373KB

    • MD5

      e96dbde934e068285ea1959a4793663a

    • SHA1

      f2bfa5c9982691f9e46553899f27e9dd7ff6d2d1

    • SHA256

      f357668862a1af4f388eeca8868bd3c502d2a51ac80a9c8c4f92d4c61247769b

    • SHA512

      ca2896f04b19a570302be17dc6997c03672c8dfb051b8dfae256a1ba4da550691801ae154ec8e38a740327215c82b2195bf5eef4d476f4ce3f4462a6bce728f6

    • SSDEEP

      6144:o6enNkfdjqKveug2LohOGYw6CC5jTT453mjEIbWiGVAKSLFN+YInSCRvuPsxNTA:XeNgWKGuHL2OGY/TTy2jEIJc6FNu3uPL

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks