General

  • Target

    f1ed106609467e1a52d1ce49382cce4a_JaffaCakes118

  • Size

    210KB

  • Sample

    240415-zxtpwagd53

  • MD5

    f1ed106609467e1a52d1ce49382cce4a

  • SHA1

    fad596e0a7f25e024b6f6e63c8f6b6baff667ce5

  • SHA256

    c190db17fb46c7a896f008e0afdeecf1e214fcd16d66a3a35d5a3566dd68e34c

  • SHA512

    a88da66178153bbb889f85068532007de9c1ee2aaac01b0e4096c8a44b65030a07ad9ce631a08ce0728cb413438a1f68e6e8d0334e86552150f6c2f8c21f6868

  • SSDEEP

    3072:SWDSosHbMOD8srvN7gR9tfM529Q4JOKzNxqaq8wPg20x5aIdU2MMjJEeQw9Txo:SMs7MOD8srVURv59QexqaFLLaL86wc

Score
10/10

Malware Config

Targets

    • Target

      f1ed106609467e1a52d1ce49382cce4a_JaffaCakes118

    • Size

      210KB

    • MD5

      f1ed106609467e1a52d1ce49382cce4a

    • SHA1

      fad596e0a7f25e024b6f6e63c8f6b6baff667ce5

    • SHA256

      c190db17fb46c7a896f008e0afdeecf1e214fcd16d66a3a35d5a3566dd68e34c

    • SHA512

      a88da66178153bbb889f85068532007de9c1ee2aaac01b0e4096c8a44b65030a07ad9ce631a08ce0728cb413438a1f68e6e8d0334e86552150f6c2f8c21f6868

    • SSDEEP

      3072:SWDSosHbMOD8srvN7gR9tfM529Q4JOKzNxqaq8wPg20x5aIdU2MMjJEeQw9Txo:SMs7MOD8srVURv59QexqaFLLaL86wc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks