General

  • Target

    7a45a317b215a5fc4907d1828c9f1263_JaffaCakes118

  • Size

    3.8MB

  • Sample

    240527-yaqt2afd5s

  • MD5

    7a45a317b215a5fc4907d1828c9f1263

  • SHA1

    f15926eb2210f91e47941b7e5aebc1c02cbc2bd1

  • SHA256

    16d8c519fbaaef894b9093ccdb77a7d1becf9d00607349b8e0587efc6f01e213

  • SHA512

    7b48cc19be805f2ff1f3928ad255d60434dfdec20f65ae0be6c8b09d965099b667fbb0f88a72b1962b6cc80007dc3a585bb4bd9305ac797e620edd94761c4976

  • SSDEEP

    98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdG:uZHrzyG+2aDHGkS8Cg

Score
7/10

Malware Config

Targets

    • Target

      7a45a317b215a5fc4907d1828c9f1263_JaffaCakes118

    • Size

      3.8MB

    • MD5

      7a45a317b215a5fc4907d1828c9f1263

    • SHA1

      f15926eb2210f91e47941b7e5aebc1c02cbc2bd1

    • SHA256

      16d8c519fbaaef894b9093ccdb77a7d1becf9d00607349b8e0587efc6f01e213

    • SHA512

      7b48cc19be805f2ff1f3928ad255d60434dfdec20f65ae0be6c8b09d965099b667fbb0f88a72b1962b6cc80007dc3a585bb4bd9305ac797e620edd94761c4976

    • SSDEEP

      98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdG:uZHrzyG+2aDHGkS8Cg

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks