General

  • Target

    659f8fec40810f7fa45c49039d5d1e99_JaffaCakes118

  • Size

    69KB

  • Sample

    240522-cgejpagg96

  • MD5

    659f8fec40810f7fa45c49039d5d1e99

  • SHA1

    c0ac332e47fdca2bee3bbd53e41d79ecb2f40f6f

  • SHA256

    63f9a90115978f57afc2afd56992e1a413d3a6b0b79fd1b0ae5036812cebf12e

  • SHA512

    fb9bca5a71856ee1c6ef4c9bd0a492f2a2a450ed166052ec253752008b89953f55efb22b1d7c843e6657a24fc646890278bff03bbc558726c57aff7a512997db

  • SSDEEP

    768:DXirRkVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o94GYterHihX51CLW:j4Rkocn1kp59gxBK85fBt+a9tjTiLI

Score
10/10

Malware Config

Targets

    • Target

      659f8fec40810f7fa45c49039d5d1e99_JaffaCakes118

    • Size

      69KB

    • MD5

      659f8fec40810f7fa45c49039d5d1e99

    • SHA1

      c0ac332e47fdca2bee3bbd53e41d79ecb2f40f6f

    • SHA256

      63f9a90115978f57afc2afd56992e1a413d3a6b0b79fd1b0ae5036812cebf12e

    • SHA512

      fb9bca5a71856ee1c6ef4c9bd0a492f2a2a450ed166052ec253752008b89953f55efb22b1d7c843e6657a24fc646890278bff03bbc558726c57aff7a512997db

    • SSDEEP

      768:DXirRkVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o94GYterHihX51CLW:j4Rkocn1kp59gxBK85fBt+a9tjTiLI

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks