General

  • Target

    f2c5bc68add932373f581365cf249ecb_JaffaCakes118

  • Size

    259KB

  • Sample

    240416-f1gpyacc2s

  • MD5

    f2c5bc68add932373f581365cf249ecb

  • SHA1

    14533a43ea3a7b78812e0263810d44f6ad82012c

  • SHA256

    21ac184352fc0a9d83f4e93db5f78f792a1074e143eb0fc68c139a7a198e2601

  • SHA512

    9f06fa6674c6f4078da7671a335e1725c2352726a37b98d2697dec93670ea469183f2270b94e9b1f2c2047616c6339b982460ce8ecd37b4b0deea840b30696c1

  • SSDEEP

    6144:S+NSLcq+YXEs5SYaX4zMY4DfqygwREk4a:7PYXEsVzzMYkSybEk4a

Score
10/10

Malware Config

Targets

    • Target

      f2c5bc68add932373f581365cf249ecb_JaffaCakes118

    • Size

      259KB

    • MD5

      f2c5bc68add932373f581365cf249ecb

    • SHA1

      14533a43ea3a7b78812e0263810d44f6ad82012c

    • SHA256

      21ac184352fc0a9d83f4e93db5f78f792a1074e143eb0fc68c139a7a198e2601

    • SHA512

      9f06fa6674c6f4078da7671a335e1725c2352726a37b98d2697dec93670ea469183f2270b94e9b1f2c2047616c6339b982460ce8ecd37b4b0deea840b30696c1

    • SSDEEP

      6144:S+NSLcq+YXEs5SYaX4zMY4DfqygwREk4a:7PYXEsVzzMYkSybEk4a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks