General

  • Target

    1568fd7abb74fdc3ddfeddafdb1718d7_JaffaCakes118

  • Size

    11KB

  • Sample

    240627-kx3kfswapj

  • MD5

    1568fd7abb74fdc3ddfeddafdb1718d7

  • SHA1

    a5e88d5fea33b6c9671defe70f96fa8be5b8e5a4

  • SHA256

    8c8326b81b34e2f497af391d332e2f6994b807b3ff7c6bccdb728e976d2a8485

  • SHA512

    6fbc19c649c5d27a82d669061369d4a9f92bc26287dfe6d5795a7ef7aed04cd9fba8d661ed0784778ddd3e84887302f6923f7ca5fd878a28ec93a22b964d693f

  • SSDEEP

    192:DYR+wsLmf9VfgnkYWCoIne80kotFfBnVPJ0Y3jbBUdb1e65:E6irfgkYfX0t93B13jbBUdbb

Malware Config

Targets

    • Target

      1568fd7abb74fdc3ddfeddafdb1718d7_JaffaCakes118

    • Size

      11KB

    • MD5

      1568fd7abb74fdc3ddfeddafdb1718d7

    • SHA1

      a5e88d5fea33b6c9671defe70f96fa8be5b8e5a4

    • SHA256

      8c8326b81b34e2f497af391d332e2f6994b807b3ff7c6bccdb728e976d2a8485

    • SHA512

      6fbc19c649c5d27a82d669061369d4a9f92bc26287dfe6d5795a7ef7aed04cd9fba8d661ed0784778ddd3e84887302f6923f7ca5fd878a28ec93a22b964d693f

    • SSDEEP

      192:DYR+wsLmf9VfgnkYWCoIne80kotFfBnVPJ0Y3jbBUdb1e65:E6irfgkYfX0t93B13jbBUdbb

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks