General

  • Target

    f2e0730d139f1678ea684c64e19bcb4b_JaffaCakes118

  • Size

    138KB

  • Sample

    240416-g27s7abb96

  • MD5

    f2e0730d139f1678ea684c64e19bcb4b

  • SHA1

    536424c97f9dabe59260da33a56c36b733235e93

  • SHA256

    efb42b3b350b84fc4f0818710d613fdaecddf6b000420543e172f42fa40d9003

  • SHA512

    2bdb16789607266cd8488916e9156cedb2057ee3b8c53c3dc7837eee43b22ecf6c7a84cec867dd75ff3b23ed1e10970754fb46685266ccc3762fbdabe0d1e16c

  • SSDEEP

    3072:oUu3OLKZBOgX6oooxvji42GNi63LD6z2qoaaaaaaaaaaaaaaaaaaaaaaaaaaaaak:od36KZl3ooxvj12Gc67Moaaaaaaaaaaz

Score
10/10

Malware Config

Targets

    • Target

      f2e0730d139f1678ea684c64e19bcb4b_JaffaCakes118

    • Size

      138KB

    • MD5

      f2e0730d139f1678ea684c64e19bcb4b

    • SHA1

      536424c97f9dabe59260da33a56c36b733235e93

    • SHA256

      efb42b3b350b84fc4f0818710d613fdaecddf6b000420543e172f42fa40d9003

    • SHA512

      2bdb16789607266cd8488916e9156cedb2057ee3b8c53c3dc7837eee43b22ecf6c7a84cec867dd75ff3b23ed1e10970754fb46685266ccc3762fbdabe0d1e16c

    • SSDEEP

      3072:oUu3OLKZBOgX6oooxvji42GNi63LD6z2qoaaaaaaaaaaaaaaaaaaaaaaaaaaaaak:od36KZl3ooxvj12Gc67Moaaaaaaaaaaz

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks