General

  • Target

    03c889f28e0d2d09f6387727addf7436_JaffaCakes118

  • Size

    6.6MB

  • Sample

    240427-2jp6msad71

  • MD5

    03c889f28e0d2d09f6387727addf7436

  • SHA1

    7b2d79570fc4aeddb7936984113832f9edb6aad8

  • SHA256

    a9024af6e6d6ef12fc7050d662b5ada6ae842949369e207a0ba79ab5578298c8

  • SHA512

    eecdb6a011895c618f621497318bf873e7b724e3e9bed9231b5b26ac08e8ad1b11229673a8d00eb4d588edc7553416ab2b00ddaa0631964bbe2029e4379151ce

  • SSDEEP

    196608:WpGu/lIOltK5wslSljZ5BArz5LltH04w1XHXrl+9a9R:Vu/lXkwSSld505Lcz1XHXh+Y9R

Score
7/10

Malware Config

Targets

    • Target

      03c889f28e0d2d09f6387727addf7436_JaffaCakes118

    • Size

      6.6MB

    • MD5

      03c889f28e0d2d09f6387727addf7436

    • SHA1

      7b2d79570fc4aeddb7936984113832f9edb6aad8

    • SHA256

      a9024af6e6d6ef12fc7050d662b5ada6ae842949369e207a0ba79ab5578298c8

    • SHA512

      eecdb6a011895c618f621497318bf873e7b724e3e9bed9231b5b26ac08e8ad1b11229673a8d00eb4d588edc7553416ab2b00ddaa0631964bbe2029e4379151ce

    • SSDEEP

      196608:WpGu/lIOltK5wslSljZ5BArz5LltH04w1XHXrl+9a9R:Vu/lXkwSSld505Lcz1XHXh+Y9R

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks