General

  • Target

    689120539f674a9ab5e72bcf5bd35567_JaffaCakes118

  • Size

    588KB

  • Sample

    240522-zjb8nsfh4z

  • MD5

    689120539f674a9ab5e72bcf5bd35567

  • SHA1

    f9547ca1941ee160a40a9e62f538766a9670c732

  • SHA256

    34228f11242a7fab50bda1595df3241c16fd8932cee342abd1522201f9622e20

  • SHA512

    a48a3da08857b97d41f7985195c3168e1eade63e67143a047f9ac023cede12c78663a26fcb35047a17552f6d87e150cafc4d6c909367265f12e797cc1c71a689

  • SSDEEP

    12288:HXznQ+bCxWrUhLZvzC/igEhrNA9SNwyrYAmyhIna3PiGpYh7jS:qgIh0/iLhrekeKYAl4RNS

Score
7/10

Malware Config

Targets

    • Target

      689120539f674a9ab5e72bcf5bd35567_JaffaCakes118

    • Size

      588KB

    • MD5

      689120539f674a9ab5e72bcf5bd35567

    • SHA1

      f9547ca1941ee160a40a9e62f538766a9670c732

    • SHA256

      34228f11242a7fab50bda1595df3241c16fd8932cee342abd1522201f9622e20

    • SHA512

      a48a3da08857b97d41f7985195c3168e1eade63e67143a047f9ac023cede12c78663a26fcb35047a17552f6d87e150cafc4d6c909367265f12e797cc1c71a689

    • SSDEEP

      12288:HXznQ+bCxWrUhLZvzC/igEhrNA9SNwyrYAmyhIna3PiGpYh7jS:qgIh0/iLhrekeKYAl4RNS

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks