General

  • Target

    014563a17a5638ed6c140ca6982a6b3c_JaffaCakes118

  • Size

    129KB

  • Sample

    240426-vwb18agd47

  • MD5

    014563a17a5638ed6c140ca6982a6b3c

  • SHA1

    10183edb7e2e05e749b2698cff8a3b64e3cdc4de

  • SHA256

    cd59e84745bfb55774901a9b9c06ad399da3216f8cc42f6eabf227176b78c432

  • SHA512

    161430d7fa5d98bc43940e2a56e5fa9505b8269c17391b86771538dcfd49eb4663ea5d139dadf69d9a74a5f673b4cb5ebc4affde912662d1f53a168f67b15c63

  • SSDEEP

    1536:ZaxEGgMCS76vGPYI+aJBBXBYQpa6QNWbyK1abTayutbKk66Hlr8GW39QRPFGTcyE:yBvmImsbeOA36oEL7

Score
10/10

Malware Config

Targets

    • Target

      014563a17a5638ed6c140ca6982a6b3c_JaffaCakes118

    • Size

      129KB

    • MD5

      014563a17a5638ed6c140ca6982a6b3c

    • SHA1

      10183edb7e2e05e749b2698cff8a3b64e3cdc4de

    • SHA256

      cd59e84745bfb55774901a9b9c06ad399da3216f8cc42f6eabf227176b78c432

    • SHA512

      161430d7fa5d98bc43940e2a56e5fa9505b8269c17391b86771538dcfd49eb4663ea5d139dadf69d9a74a5f673b4cb5ebc4affde912662d1f53a168f67b15c63

    • SSDEEP

      1536:ZaxEGgMCS76vGPYI+aJBBXBYQpa6QNWbyK1abTayutbKk66Hlr8GW39QRPFGTcyE:yBvmImsbeOA36oEL7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks