General

  • Target

    f2741d93212ada7bc29309d42cb5ed58_JaffaCakes118

  • Size

    201KB

  • Sample

    240416-cnlxcagg6y

  • MD5

    f2741d93212ada7bc29309d42cb5ed58

  • SHA1

    67599ed19beda4b7766a407a8a7d912dcad78fd5

  • SHA256

    0ce153cee62b38b17c88da46eca6035a17eda5314da73cca0b22535bf04c90ea

  • SHA512

    5d86b3411e0f4f045a5dbc8d004c59fe7cd7c0a6fc706bae9410d85a57b0c54b5eaa9731ac90c811b5c0e4bd386080c1e309e0dd512f1d695fb5227e3295c19e

  • SSDEEP

    6144:kogkLjLhEIlIYaXjJensv7s1tW3qVN/Xk:BDLZJlI9XjJdetyYJk

Score
10/10

Malware Config

Targets

    • Target

      f2741d93212ada7bc29309d42cb5ed58_JaffaCakes118

    • Size

      201KB

    • MD5

      f2741d93212ada7bc29309d42cb5ed58

    • SHA1

      67599ed19beda4b7766a407a8a7d912dcad78fd5

    • SHA256

      0ce153cee62b38b17c88da46eca6035a17eda5314da73cca0b22535bf04c90ea

    • SHA512

      5d86b3411e0f4f045a5dbc8d004c59fe7cd7c0a6fc706bae9410d85a57b0c54b5eaa9731ac90c811b5c0e4bd386080c1e309e0dd512f1d695fb5227e3295c19e

    • SSDEEP

      6144:kogkLjLhEIlIYaXjJensv7s1tW3qVN/Xk:BDLZJlI9XjJdetyYJk

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks