General

  • Target

    0092a905707b67411fa7410e1928e3bd_JaffaCakes118

  • Size

    15KB

  • Sample

    240619-z98pkascph

  • MD5

    0092a905707b67411fa7410e1928e3bd

  • SHA1

    2a6124ccc212c3dff546a0888766a471849d0f74

  • SHA256

    2fd730ed3b66cbb49655ca49e1718a3caa147572ba824dc322390ed2ee626009

  • SHA512

    81f77ad014de344fa1f09e869131f24aa4e1860487f0ad74bf13ba96ea9675a48fa5d6ef721c898906eff9e5dea23fe7c5978098d807cf3796321f968bf747e0

  • SSDEEP

    384:3Hi1PKlhMWPyTWz1H2Il9Ivj9djueO+gCW54p:3i43aKzX7Wd5O+aqp

Malware Config

Targets

    • Target

      0092a905707b67411fa7410e1928e3bd_JaffaCakes118

    • Size

      15KB

    • MD5

      0092a905707b67411fa7410e1928e3bd

    • SHA1

      2a6124ccc212c3dff546a0888766a471849d0f74

    • SHA256

      2fd730ed3b66cbb49655ca49e1718a3caa147572ba824dc322390ed2ee626009

    • SHA512

      81f77ad014de344fa1f09e869131f24aa4e1860487f0ad74bf13ba96ea9675a48fa5d6ef721c898906eff9e5dea23fe7c5978098d807cf3796321f968bf747e0

    • SSDEEP

      384:3Hi1PKlhMWPyTWz1H2Il9Ivj9djueO+gCW54p:3i43aKzX7Wd5O+aqp

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks