General

  • Target

    f96d281618e4a12d3304eda316fcd78f_JaffaCakes118

  • Size

    248KB

  • Sample

    240419-d9m7zagg2t

  • MD5

    f96d281618e4a12d3304eda316fcd78f

  • SHA1

    cddc339edb26797bbc0b24255f958fdee4ecf7d8

  • SHA256

    0ef83c93e551f8d1f6e43a2886f24b737b8594d96a84d49af2249074d71e386e

  • SHA512

    db3c68d7e825c8f27f2dbb9f522f748a50f465f5c5ef764317f02b0c469e35831fd662ae0514556a8d6aa3d24045fdf9cfaef53991895a8049f77c804819d5dd

  • SSDEEP

    6144:SJtZbAPPimNA/kjoitkWmvWHD0MqXZDp7By3e2QS:AtZbAPDNAcMGqWjp81D2QS

Score
10/10

Malware Config

Targets

    • Target

      f96d281618e4a12d3304eda316fcd78f_JaffaCakes118

    • Size

      248KB

    • MD5

      f96d281618e4a12d3304eda316fcd78f

    • SHA1

      cddc339edb26797bbc0b24255f958fdee4ecf7d8

    • SHA256

      0ef83c93e551f8d1f6e43a2886f24b737b8594d96a84d49af2249074d71e386e

    • SHA512

      db3c68d7e825c8f27f2dbb9f522f748a50f465f5c5ef764317f02b0c469e35831fd662ae0514556a8d6aa3d24045fdf9cfaef53991895a8049f77c804819d5dd

    • SSDEEP

      6144:SJtZbAPPimNA/kjoitkWmvWHD0MqXZDp7By3e2QS:AtZbAPDNAcMGqWjp81D2QS

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks