General

  • Target

    f36e8e47e372b2a13c3cefe3f0811639_JaffaCakes118

  • Size

    266KB

  • Sample

    240416-ny42fsbd4z

  • MD5

    f36e8e47e372b2a13c3cefe3f0811639

  • SHA1

    1c950cb74285f76c74a0be15227d0768482522ae

  • SHA256

    32b25536a8d4a69b50e2a07589dcd3d087e0cf6fade720a60c5ccf4aeba00039

  • SHA512

    ebf1e2909b9dbbb4a41a6b3da78ccbeeea75f43cd298fa037d7484caf22a1a597a1b2f10070a96476817cd27d3d3fc7a645bc68fdd8270ab7eeaea40af693927

  • SSDEEP

    6144:S6tZbAPPimNA/kjoitkpXfrK5L2agpzdQzCUh3kzN0cb6QlQ:9tZbAPDNAcMpALMpZ7USjVS

Score
10/10

Malware Config

Targets

    • Target

      f36e8e47e372b2a13c3cefe3f0811639_JaffaCakes118

    • Size

      266KB

    • MD5

      f36e8e47e372b2a13c3cefe3f0811639

    • SHA1

      1c950cb74285f76c74a0be15227d0768482522ae

    • SHA256

      32b25536a8d4a69b50e2a07589dcd3d087e0cf6fade720a60c5ccf4aeba00039

    • SHA512

      ebf1e2909b9dbbb4a41a6b3da78ccbeeea75f43cd298fa037d7484caf22a1a597a1b2f10070a96476817cd27d3d3fc7a645bc68fdd8270ab7eeaea40af693927

    • SSDEEP

      6144:S6tZbAPPimNA/kjoitkpXfrK5L2agpzdQzCUh3kzN0cb6QlQ:9tZbAPDNAcMpALMpZ7USjVS

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks