General

  • Target

    f820bc2bb27f36796ee0379061632511_JaffaCakes118

  • Size

    110KB

  • Sample

    240418-q4vq3seh23

  • MD5

    f820bc2bb27f36796ee0379061632511

  • SHA1

    8559b5899ba0e7bdc4fe0877b39faa9e3a7d5760

  • SHA256

    b214193acfdcd49438a1c40ab18ff00e8c6774295e920c6e51ae662946fd4deb

  • SHA512

    6953246c09d2926b7ca6e2a1f6fe38629e26a623317367ac1a5066af14c5df441d71dd2b2aa74bf04e09d61e4561d64e766af5acbf3bde3a36b061c11d709a4a

  • SSDEEP

    3072:oUSxVX8Zi63LD6z2qoaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa3RY3PaaaaaaaH:oxb8Q67Moaaaaaaaaaaaaaaaaaaaaaao

Score
10/10

Malware Config

Targets

    • Target

      f820bc2bb27f36796ee0379061632511_JaffaCakes118

    • Size

      110KB

    • MD5

      f820bc2bb27f36796ee0379061632511

    • SHA1

      8559b5899ba0e7bdc4fe0877b39faa9e3a7d5760

    • SHA256

      b214193acfdcd49438a1c40ab18ff00e8c6774295e920c6e51ae662946fd4deb

    • SHA512

      6953246c09d2926b7ca6e2a1f6fe38629e26a623317367ac1a5066af14c5df441d71dd2b2aa74bf04e09d61e4561d64e766af5acbf3bde3a36b061c11d709a4a

    • SSDEEP

      3072:oUSxVX8Zi63LD6z2qoaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa3RY3PaaaaaaaH:oxb8Q67Moaaaaaaaaaaaaaaaaaaaaaao

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks