General

  • Target

    ad74565da6d038a868cda85d2f032a65_JaffaCakes118

  • Size

    3.8MB

  • Sample

    240615-jzbn3stbke

  • MD5

    ad74565da6d038a868cda85d2f032a65

  • SHA1

    fdaa795cf82ca61215a638e79c9d11138b941bab

  • SHA256

    93fe6bcd440ed7686afe5138ddf23a0374434406d200714f794eb5bd5215f4fe

  • SHA512

    9f38c551429833384603586235704027dacd9dd99ffbe53dda1dae6927b54693330df89f196333a454e5d0ba2bc788cd7bb41f74d7eb81ce66525ef91eb259f1

  • SSDEEP

    98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdw:uZHrzyG+2aDHGkS8Ce

Score
7/10

Malware Config

Targets

    • Target

      ad74565da6d038a868cda85d2f032a65_JaffaCakes118

    • Size

      3.8MB

    • MD5

      ad74565da6d038a868cda85d2f032a65

    • SHA1

      fdaa795cf82ca61215a638e79c9d11138b941bab

    • SHA256

      93fe6bcd440ed7686afe5138ddf23a0374434406d200714f794eb5bd5215f4fe

    • SHA512

      9f38c551429833384603586235704027dacd9dd99ffbe53dda1dae6927b54693330df89f196333a454e5d0ba2bc788cd7bb41f74d7eb81ce66525ef91eb259f1

    • SSDEEP

      98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdw:uZHrzyG+2aDHGkS8Ce

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks