General

  • Target

    696bca0e525884c2707789bdea4a9020_JaffaCakes118

  • Size

    73KB

  • Sample

    240523-crbksaae26

  • MD5

    696bca0e525884c2707789bdea4a9020

  • SHA1

    19331e351fc0e9730d0df4f9000eecea8ce0fc8a

  • SHA256

    9243685da3defde3ad5297959c49e9d862d86b435eb659cf5de203108eb875a6

  • SHA512

    a86976f759726ebd1979c5334b5d87e141c01df323bf813628956374a034b163e7a1d0928ea656946891e47937213c91d49fe7249906ca9fadf180188852bb6f

  • SSDEEP

    768:I/rVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o9OLKXeIVMOwS:I/rocn1kp59gxBK85fBt+a9Os

Score
10/10

Malware Config

Targets

    • Target

      696bca0e525884c2707789bdea4a9020_JaffaCakes118

    • Size

      73KB

    • MD5

      696bca0e525884c2707789bdea4a9020

    • SHA1

      19331e351fc0e9730d0df4f9000eecea8ce0fc8a

    • SHA256

      9243685da3defde3ad5297959c49e9d862d86b435eb659cf5de203108eb875a6

    • SHA512

      a86976f759726ebd1979c5334b5d87e141c01df323bf813628956374a034b163e7a1d0928ea656946891e47937213c91d49fe7249906ca9fadf180188852bb6f

    • SSDEEP

      768:I/rVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o9OLKXeIVMOwS:I/rocn1kp59gxBK85fBt+a9Os

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks