General

  • Target

    079457f5827ac5a210fa9e68c6aa17aa_JaffaCakes118

  • Size

    13KB

  • Sample

    240620-tkglwswdmf

  • MD5

    079457f5827ac5a210fa9e68c6aa17aa

  • SHA1

    eee1fe12b8d1406fb5df3a6817e12c84a9669bc9

  • SHA256

    fb67fb4e67c0479ff6a7fcdc55be21f5f99078264c0c787b695c2feb6094f6a1

  • SHA512

    d9a11c16bbb05a945ef501bd3564def6c31bb93bbb62dcb769f0327f0b81c176b573f895d629cad727c637ee2c167ebdebe887e00f0fa8bc205161741ba2c840

  • SSDEEP

    192:ktBPQNgnouH+22mvT+QcomdJgFplBQwYrzutXJHmmCvttMlfr5WBVmspheXFlb:ScgnoujqddJ+NAutI3tt2rIHPWV5

Malware Config

Targets

    • Target

      079457f5827ac5a210fa9e68c6aa17aa_JaffaCakes118

    • Size

      13KB

    • MD5

      079457f5827ac5a210fa9e68c6aa17aa

    • SHA1

      eee1fe12b8d1406fb5df3a6817e12c84a9669bc9

    • SHA256

      fb67fb4e67c0479ff6a7fcdc55be21f5f99078264c0c787b695c2feb6094f6a1

    • SHA512

      d9a11c16bbb05a945ef501bd3564def6c31bb93bbb62dcb769f0327f0b81c176b573f895d629cad727c637ee2c167ebdebe887e00f0fa8bc205161741ba2c840

    • SSDEEP

      192:ktBPQNgnouH+22mvT+QcomdJgFplBQwYrzutXJHmmCvttMlfr5WBVmspheXFlb:ScgnoujqddJ+NAutI3tt2rIHPWV5

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks