General

  • Target

    6917484485548a2bd5b21d45f80922ad_JaffaCakes118

  • Size

    230KB

  • Sample

    240523-aefb4aec82

  • MD5

    6917484485548a2bd5b21d45f80922ad

  • SHA1

    005ebc1bc103ce5bc17bb3ce256d32537586b10d

  • SHA256

    52a4aeb50a4e50b42618defa945744759c4f50150bd595f83df1942499060d08

  • SHA512

    ede9d3bc3e7f24c9275ced874e51b7dda9ef139a854b08e4c2e7d97672d3c8c109a04eaba4cc818821d8e9a36629a397d61869b08ca3f7ca772589ecc2eea1ce

  • SSDEEP

    3072:QyjOCIRsmorXzUPpFZ/vvMb7eMtps7CUxKz8i5utX+fIEH9XF8UPGMrlyORDR9c2:VA8rMT/vvMb6IYC/ItOwEH91g2gSyDU

Score
7/10

Malware Config

Targets

    • Target

      6917484485548a2bd5b21d45f80922ad_JaffaCakes118

    • Size

      230KB

    • MD5

      6917484485548a2bd5b21d45f80922ad

    • SHA1

      005ebc1bc103ce5bc17bb3ce256d32537586b10d

    • SHA256

      52a4aeb50a4e50b42618defa945744759c4f50150bd595f83df1942499060d08

    • SHA512

      ede9d3bc3e7f24c9275ced874e51b7dda9ef139a854b08e4c2e7d97672d3c8c109a04eaba4cc818821d8e9a36629a397d61869b08ca3f7ca772589ecc2eea1ce

    • SSDEEP

      3072:QyjOCIRsmorXzUPpFZ/vvMb7eMtps7CUxKz8i5utX+fIEH9XF8UPGMrlyORDR9c2:VA8rMT/vvMb6IYC/ItOwEH91g2gSyDU

    Score
    7/10
    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks