General

  • Target

    fb6b87af393cfa7caa672bc6101abffa_JaffaCakes118

  • Size

    92KB

  • Sample

    240419-3l7zxaad96

  • MD5

    fb6b87af393cfa7caa672bc6101abffa

  • SHA1

    743075ce7b85b2d12ffd9cc644440664072dc958

  • SHA256

    9ce3030bebebb154e7cc687a93505e1992bb8491c0aed95afa651d9c00f06961

  • SHA512

    18e04f5c82fd4113e394515000c454d6cab0a13d6749cff5f35b6d4974f4732955d0b68d55c0a682879bb04ace43a77edf873512a8b38506d2106812da88411a

  • SSDEEP

    1536:lPKe873D0fAOilS32HZuXWEpNlHkGR6DDYMRQ+g:lSn74pilSyZuXLXktDjQ

Score
7/10

Malware Config

Targets

    • Target

      fb6b87af393cfa7caa672bc6101abffa_JaffaCakes118

    • Size

      92KB

    • MD5

      fb6b87af393cfa7caa672bc6101abffa

    • SHA1

      743075ce7b85b2d12ffd9cc644440664072dc958

    • SHA256

      9ce3030bebebb154e7cc687a93505e1992bb8491c0aed95afa651d9c00f06961

    • SHA512

      18e04f5c82fd4113e394515000c454d6cab0a13d6749cff5f35b6d4974f4732955d0b68d55c0a682879bb04ace43a77edf873512a8b38506d2106812da88411a

    • SSDEEP

      1536:lPKe873D0fAOilS32HZuXWEpNlHkGR6DDYMRQ+g:lSn74pilSyZuXLXktDjQ

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks