General

  • Target

    f35c9ff145b5a727020b9d2e1f7291f4_JaffaCakes118

  • Size

    53KB

  • Sample

    240416-m77m9sgg96

  • MD5

    f35c9ff145b5a727020b9d2e1f7291f4

  • SHA1

    d0c253078db2d885840ef6ba86d9877d3de9ede5

  • SHA256

    4cd47185d77feffae0c057f878b3fb90bc6fc411a473e57dc962acfc902d17fa

  • SHA512

    917cc02c40e18f519e84ad1582a2eb7704a5c8866c7147b85be18995aca9307e00e9415a4fb7511c3277a76557913627535f68643470006b51c469b80da751f0

  • SSDEEP

    1536:uO6xAo85YVyI+XjfJkuJLOPoLtHPoYhnouy8b:uCZ1CGOPotoYBoutb

Score
7/10

Malware Config

Targets

    • Target

      f35c9ff145b5a727020b9d2e1f7291f4_JaffaCakes118

    • Size

      53KB

    • MD5

      f35c9ff145b5a727020b9d2e1f7291f4

    • SHA1

      d0c253078db2d885840ef6ba86d9877d3de9ede5

    • SHA256

      4cd47185d77feffae0c057f878b3fb90bc6fc411a473e57dc962acfc902d17fa

    • SHA512

      917cc02c40e18f519e84ad1582a2eb7704a5c8866c7147b85be18995aca9307e00e9415a4fb7511c3277a76557913627535f68643470006b51c469b80da751f0

    • SSDEEP

      1536:uO6xAo85YVyI+XjfJkuJLOPoLtHPoYhnouy8b:uCZ1CGOPotoYBoutb

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks