General

  • Target

    6a040e248764a51780f3cc6039ad2494_JaffaCakes118

  • Size

    4.7MB

  • Sample

    240523-g39n6sgb74

  • MD5

    6a040e248764a51780f3cc6039ad2494

  • SHA1

    f064ccbb722be9ecef93bf1540b0e1f4997aa5a3

  • SHA256

    78bd51c04ccf7961fb7b196988fb57bc9cffdfb644560b03ea14b61761d8c4ed

  • SHA512

    2aaba0a93027f0268ded799c952a2340295baace2f8cacac79ed5c8b1143eb8114e1fe770e61fa32ec11863019ab3eae322ccf6721610dc312156c9f4d32b4ce

  • SSDEEP

    98304:Ae4d8iEityhkhqloaxeq7jhIXUvPBnnom2LSqLyg:nCnyhkhBaxem1tPBn2uqp

Score
7/10

Malware Config

Targets

    • Target

      6a040e248764a51780f3cc6039ad2494_JaffaCakes118

    • Size

      4.7MB

    • MD5

      6a040e248764a51780f3cc6039ad2494

    • SHA1

      f064ccbb722be9ecef93bf1540b0e1f4997aa5a3

    • SHA256

      78bd51c04ccf7961fb7b196988fb57bc9cffdfb644560b03ea14b61761d8c4ed

    • SHA512

      2aaba0a93027f0268ded799c952a2340295baace2f8cacac79ed5c8b1143eb8114e1fe770e61fa32ec11863019ab3eae322ccf6721610dc312156c9f4d32b4ce

    • SSDEEP

      98304:Ae4d8iEityhkhqloaxeq7jhIXUvPBnnom2LSqLyg:nCnyhkhBaxem1tPBn2uqp

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks