General

  • Target

    001b4dfcbb02bb0ab988a7c35a3a9ff5_JaffaCakes118

  • Size

    132KB

  • Sample

    240425-z9fnsafb82

  • MD5

    001b4dfcbb02bb0ab988a7c35a3a9ff5

  • SHA1

    0d6f5812058e8145db07aeea9e669b1c66982acb

  • SHA256

    7102877d70ad54f07bdb5baa4c9a995962b6c7b93b10455b1c118a40954dcd22

  • SHA512

    a0e6404e531d102c510e0177a487fc8e914040dd69d0becfc9ef2bb74d117c998762dfa703fe90356b66b7c6ef9477967fe85f82eb9742d300ca8cd36a3c5e89

  • SSDEEP

    1536:DLh81ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvadnf+aSzdgY7JM8E2LxUkB:58GhDS0o9zTGOZD6EbzCd+JM8X1B

Score
10/10

Malware Config

Targets

    • Target

      001b4dfcbb02bb0ab988a7c35a3a9ff5_JaffaCakes118

    • Size

      132KB

    • MD5

      001b4dfcbb02bb0ab988a7c35a3a9ff5

    • SHA1

      0d6f5812058e8145db07aeea9e669b1c66982acb

    • SHA256

      7102877d70ad54f07bdb5baa4c9a995962b6c7b93b10455b1c118a40954dcd22

    • SHA512

      a0e6404e531d102c510e0177a487fc8e914040dd69d0becfc9ef2bb74d117c998762dfa703fe90356b66b7c6ef9477967fe85f82eb9742d300ca8cd36a3c5e89

    • SSDEEP

      1536:DLh81ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvadnf+aSzdgY7JM8E2LxUkB:58GhDS0o9zTGOZD6EbzCd+JM8X1B

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks