General

  • Target

    6960bf222a218348727ce622f586e0f8_JaffaCakes118

  • Size

    6.6MB

  • Sample

    240523-cfkpbahh65

  • MD5

    6960bf222a218348727ce622f586e0f8

  • SHA1

    62ca3d7ec819bfbaa2e55bf150f05cab8418e641

  • SHA256

    e0ed7c1abd8da361ac41e071b028b3753e753d0cc8cd5cc027a0a30eb76d3640

  • SHA512

    699990379be968e8bb35284fc44fb74b2643b34f8a4e7559be97bc27ba8d37c58b06695eddc41fe520981e104f7efdc04e56b919ed7e9bf36d7b7cf3d5a9ef74

  • SSDEEP

    98304:sLOoYf4N/afGLqagIxcnHSHphb9VcEClPlHZOK3ntC1wz2HNlf7t7u/Kjulr+Ip0:s9YfO3DcnHSTOltH04w1XHXj4/Bs

Score
7/10

Malware Config

Targets

    • Target

      6960bf222a218348727ce622f586e0f8_JaffaCakes118

    • Size

      6.6MB

    • MD5

      6960bf222a218348727ce622f586e0f8

    • SHA1

      62ca3d7ec819bfbaa2e55bf150f05cab8418e641

    • SHA256

      e0ed7c1abd8da361ac41e071b028b3753e753d0cc8cd5cc027a0a30eb76d3640

    • SHA512

      699990379be968e8bb35284fc44fb74b2643b34f8a4e7559be97bc27ba8d37c58b06695eddc41fe520981e104f7efdc04e56b919ed7e9bf36d7b7cf3d5a9ef74

    • SSDEEP

      98304:sLOoYf4N/afGLqagIxcnHSHphb9VcEClPlHZOK3ntC1wz2HNlf7t7u/Kjulr+Ip0:s9YfO3DcnHSTOltH04w1XHXj4/Bs

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks