General

  • Target

    630c21a445c205505221ce85753305a9_JaffaCakes118

  • Size

    30KB

  • Sample

    240521-m1kj6aah84

  • MD5

    630c21a445c205505221ce85753305a9

  • SHA1

    c5250b5f361025445791ba5d4d7a3e407eba2578

  • SHA256

    0956bc121028e4e1883277680b745a1707b83e90485c392f3943c9259b51524c

  • SHA512

    ecec55a8ccea0158a3b200d560cf22483336377e571faf6d6226dfa000f887df09108134a3509b6bb6e49b2565098620fd8e992ade5326c8d8991c60cd1d47be

  • SSDEEP

    384:k3gCPh3YEPbyvnkYUROXpG6k4xHVNzvCvhECXeUJRX4NwWZxg5yJy53tWObWjBCg:ABtqmRwptVVUvvewUTJy5dxKZ

Score
7/10

Malware Config

Targets

    • Target

      630c21a445c205505221ce85753305a9_JaffaCakes118

    • Size

      30KB

    • MD5

      630c21a445c205505221ce85753305a9

    • SHA1

      c5250b5f361025445791ba5d4d7a3e407eba2578

    • SHA256

      0956bc121028e4e1883277680b745a1707b83e90485c392f3943c9259b51524c

    • SHA512

      ecec55a8ccea0158a3b200d560cf22483336377e571faf6d6226dfa000f887df09108134a3509b6bb6e49b2565098620fd8e992ade5326c8d8991c60cd1d47be

    • SSDEEP

      384:k3gCPh3YEPbyvnkYUROXpG6k4xHVNzvCvhECXeUJRX4NwWZxg5yJy53tWObWjBCg:ABtqmRwptVVUvvewUTJy5dxKZ

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks