General

  • Target

    f779414ba9e74c0e910fe98324df4df2_JaffaCakes118

  • Size

    469KB

  • Sample

    240418-hgzgradg73

  • MD5

    f779414ba9e74c0e910fe98324df4df2

  • SHA1

    23f0f4bf94826bf13a0d4d1572c677d497535fbc

  • SHA256

    42a9e52b0f5d2fe68d9fe714b81cc5933b770007937a0ba1351d064b6ac8c1c8

  • SHA512

    f0936ffb79090a48d992c2a03dfac50a4462256b54e381dc4629b44ffbd5a8cc63f41153bf5dd266c631395b0e1156bdc3147780fd34bf4b650e2f499291bc53

  • SSDEEP

    6144:t9qmuF5g70IS6NQzZ5E+4VsPrFt3CBCT0rAZlCufjGg093NlvJsOn5f:RO5s0ID7CPr0C+WgufCgyvOOn5f

Malware Config

Targets

    • Target

      f779414ba9e74c0e910fe98324df4df2_JaffaCakes118

    • Size

      469KB

    • MD5

      f779414ba9e74c0e910fe98324df4df2

    • SHA1

      23f0f4bf94826bf13a0d4d1572c677d497535fbc

    • SHA256

      42a9e52b0f5d2fe68d9fe714b81cc5933b770007937a0ba1351d064b6ac8c1c8

    • SHA512

      f0936ffb79090a48d992c2a03dfac50a4462256b54e381dc4629b44ffbd5a8cc63f41153bf5dd266c631395b0e1156bdc3147780fd34bf4b650e2f499291bc53

    • SSDEEP

      6144:t9qmuF5g70IS6NQzZ5E+4VsPrFt3CBCT0rAZlCufjGg093NlvJsOn5f:RO5s0ID7CPr0C+WgufCgyvOOn5f

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Office macro that triggers on suspicious action

      Office document macro which triggers in special circumstances - often malicious.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks