General

  • Target

    1937ce227c68d059ab9222b1cd0beada_JaffaCakes118

  • Size

    116KB

  • Sample

    240628-hv9jwazbpp

  • MD5

    1937ce227c68d059ab9222b1cd0beada

  • SHA1

    ad01925ab10bd7782b20ff6399503ea9daeb7807

  • SHA256

    d7a3aa5ad47703c6e9915e0d806825d196051f6093e379613473321cb55c09c1

  • SHA512

    3436a7a9e20a76a5471b6faffe50bdad598a511455653f6f03eaf57e6a327090ca0d246869562dba653eeac1629829360588b77a57ff3cd424f410cd707f0119

  • SSDEEP

    3072:k3C1mhyWewnQEAgkkZ1TeygGtA8hMIxLS/SpHlQK+:k3C8kHwnQBgk2SyTA8h/GSZl

Score
7/10

Malware Config

Targets

    • Target

      1937ce227c68d059ab9222b1cd0beada_JaffaCakes118

    • Size

      116KB

    • MD5

      1937ce227c68d059ab9222b1cd0beada

    • SHA1

      ad01925ab10bd7782b20ff6399503ea9daeb7807

    • SHA256

      d7a3aa5ad47703c6e9915e0d806825d196051f6093e379613473321cb55c09c1

    • SHA512

      3436a7a9e20a76a5471b6faffe50bdad598a511455653f6f03eaf57e6a327090ca0d246869562dba653eeac1629829360588b77a57ff3cd424f410cd707f0119

    • SSDEEP

      3072:k3C1mhyWewnQEAgkkZ1TeygGtA8hMIxLS/SpHlQK+:k3C8kHwnQBgk2SyTA8h/GSZl

    Score
    7/10
    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks