General

  • Target

    f556b8ce385fc52e5ab46da5238439bb_JaffaCakes118

  • Size

    161KB

  • Sample

    240417-j2gm4she55

  • MD5

    f556b8ce385fc52e5ab46da5238439bb

  • SHA1

    fa44d7e1c39e2ab6fa76393e483e8f2d58615d43

  • SHA256

    14d0df467f121adf0e755600e9ff5142551b0ac4cfb8fa0356214d11567a9cc6

  • SHA512

    da8b90ffd4b8b72acce06343be3befd901cf0fcb9fc39997d03e8731d22d2758aed5985a8692f74e50e7c02c1d82c344977727bc1f2a5ec7a769533743a8d642

  • SSDEEP

    3072:bW1gxv7yZmspH7+cclKisQ6NqTBun5ozIhd/2jcc0lbxOreVJtXwJ:i1gxv7yZmspH7+cclKisQ6NqTBun5ozQ

Score
10/10

Malware Config

Targets

    • Target

      f556b8ce385fc52e5ab46da5238439bb_JaffaCakes118

    • Size

      161KB

    • MD5

      f556b8ce385fc52e5ab46da5238439bb

    • SHA1

      fa44d7e1c39e2ab6fa76393e483e8f2d58615d43

    • SHA256

      14d0df467f121adf0e755600e9ff5142551b0ac4cfb8fa0356214d11567a9cc6

    • SHA512

      da8b90ffd4b8b72acce06343be3befd901cf0fcb9fc39997d03e8731d22d2758aed5985a8692f74e50e7c02c1d82c344977727bc1f2a5ec7a769533743a8d642

    • SSDEEP

      3072:bW1gxv7yZmspH7+cclKisQ6NqTBun5ozIhd/2jcc0lbxOreVJtXwJ:i1gxv7yZmspH7+cclKisQ6NqTBun5ozQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks