General

  • Target

    fae13812d8feb6b29dc72430c638a728_JaffaCakes118

  • Size

    216KB

  • Sample

    240419-wrl63abe66

  • MD5

    fae13812d8feb6b29dc72430c638a728

  • SHA1

    0c0833a962d410557d4fa31481d259b80d65e61d

  • SHA256

    1f325ca84c44d05053b8a29a083b40ba8533aa2490a12aac76030188aef8d028

  • SHA512

    37b3aee7c5a2ae5d5722cf600cbd7f8d00c034013960700edbdba449348dbba31a69f7eae1866c9b36a9598f91e0c51c9ef24d72e73f819a426f65b73f278903

  • SSDEEP

    6144:Sys7MOD8srVURv59QexqaFLLaL8x9Hp63at:Xs7MOHyRBmezFHaL8Rp6K

Score
10/10

Malware Config

Targets

    • Target

      fae13812d8feb6b29dc72430c638a728_JaffaCakes118

    • Size

      216KB

    • MD5

      fae13812d8feb6b29dc72430c638a728

    • SHA1

      0c0833a962d410557d4fa31481d259b80d65e61d

    • SHA256

      1f325ca84c44d05053b8a29a083b40ba8533aa2490a12aac76030188aef8d028

    • SHA512

      37b3aee7c5a2ae5d5722cf600cbd7f8d00c034013960700edbdba449348dbba31a69f7eae1866c9b36a9598f91e0c51c9ef24d72e73f819a426f65b73f278903

    • SSDEEP

      6144:Sys7MOD8srVURv59QexqaFLLaL8x9Hp63at:Xs7MOHyRBmezFHaL8Rp6K

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks