General

  • Target

    f40677fe80c70a0da3c82551f4d50975_JaffaCakes118

  • Size

    237KB

  • Sample

    240416-wlfr4aac5x

  • MD5

    f40677fe80c70a0da3c82551f4d50975

  • SHA1

    74090eb4d2b94d4e271ce8739e9c8e35868ed154

  • SHA256

    09753ca26c16d72baa835820208eb7d284b893cf9b1ff17cd8c9a9f462c21a0e

  • SHA512

    933da2aee1853f6c4198ef43879a49e36615ebf1b6aeda0910d0e58e665d0a427e11ff59a21cfb48e8b130939ed0342aaf327e333b6d7aa1f2853181a9c9af16

  • SSDEEP

    6144:StNSLcq+YXEs52f7l5YmuueHRgGm7+fZ8H1G:SPYXEsAfb3mhmSR8U

Score
10/10

Malware Config

Targets

    • Target

      f40677fe80c70a0da3c82551f4d50975_JaffaCakes118

    • Size

      237KB

    • MD5

      f40677fe80c70a0da3c82551f4d50975

    • SHA1

      74090eb4d2b94d4e271ce8739e9c8e35868ed154

    • SHA256

      09753ca26c16d72baa835820208eb7d284b893cf9b1ff17cd8c9a9f462c21a0e

    • SHA512

      933da2aee1853f6c4198ef43879a49e36615ebf1b6aeda0910d0e58e665d0a427e11ff59a21cfb48e8b130939ed0342aaf327e333b6d7aa1f2853181a9c9af16

    • SSDEEP

      6144:StNSLcq+YXEs52f7l5YmuueHRgGm7+fZ8H1G:SPYXEsAfb3mhmSR8U

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks