General

  • Target

    fcc4e3f10d677af49364574c390ce41b_JaffaCakes118

  • Size

    323KB

  • Sample

    240420-pm5dhsgf92

  • MD5

    fcc4e3f10d677af49364574c390ce41b

  • SHA1

    dc255291e63905f4f4676fe93004a76559b92188

  • SHA256

    19d58cd2a0cc6d73d21a49abe73938e161642e94fee443dde7a1edd7e13d4a3f

  • SHA512

    9d94e2c062e3e9dadca3d1b25e0f9407afb64ebf167479aee2dbf486f9bb779ab1f2e0fcf0babffcc4df96f1ecc60c3cfa0f679837ab70b73302c9d9225d488d

  • SSDEEP

    6144:oLbS9JkqbkFdhswz+TXO/J6t/VYfASkKTzZYwPMPFde/Qxx2u+OA+NT5AE:sSPkqQ3hMTX7ifASkKTzSwkPFduQx0un

Score
10/10

Malware Config

Targets

    • Target

      fcc4e3f10d677af49364574c390ce41b_JaffaCakes118

    • Size

      323KB

    • MD5

      fcc4e3f10d677af49364574c390ce41b

    • SHA1

      dc255291e63905f4f4676fe93004a76559b92188

    • SHA256

      19d58cd2a0cc6d73d21a49abe73938e161642e94fee443dde7a1edd7e13d4a3f

    • SHA512

      9d94e2c062e3e9dadca3d1b25e0f9407afb64ebf167479aee2dbf486f9bb779ab1f2e0fcf0babffcc4df96f1ecc60c3cfa0f679837ab70b73302c9d9225d488d

    • SSDEEP

      6144:oLbS9JkqbkFdhswz+TXO/J6t/VYfASkKTzZYwPMPFde/Qxx2u+OA+NT5AE:sSPkqQ3hMTX7ifASkKTzSwkPFduQx0un

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks