General

  • Target

    07ee322946731c14f4b960a332bc4651_JaffaCakes118

  • Size

    65KB

  • Sample

    240624-mcwyaa1aqp

  • MD5

    07ee322946731c14f4b960a332bc4651

  • SHA1

    faa97458ac65eff78c8119b6fbb87ccbdcca50d9

  • SHA256

    a5f7bcc7c06cb1ee611841bb87eb88d515546845a6d7bac778b0ba3602504317

  • SHA512

    b2032d987af5c9aea028c3321731fde455be3d7ba2937f54e5522595aaa4d7be97ab79c7507ebb1315707c8342a602af0e7f3f5305f69b0ff6894775060c53b8

  • SSDEEP

    1536:dI9UGVQ1IHJWX27X9QwKzBRX7KZJf1sKkCHAjrUaMQK3dXy:GVQ/X8XGdN1+l19kRrzPyl

Score
7/10

Malware Config

Targets

    • Target

      07ee322946731c14f4b960a332bc4651_JaffaCakes118

    • Size

      65KB

    • MD5

      07ee322946731c14f4b960a332bc4651

    • SHA1

      faa97458ac65eff78c8119b6fbb87ccbdcca50d9

    • SHA256

      a5f7bcc7c06cb1ee611841bb87eb88d515546845a6d7bac778b0ba3602504317

    • SHA512

      b2032d987af5c9aea028c3321731fde455be3d7ba2937f54e5522595aaa4d7be97ab79c7507ebb1315707c8342a602af0e7f3f5305f69b0ff6894775060c53b8

    • SSDEEP

      1536:dI9UGVQ1IHJWX27X9QwKzBRX7KZJf1sKkCHAjrUaMQK3dXy:GVQ/X8XGdN1+l19kRrzPyl

    Score
    7/10
    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks