General

  • Target

    2b8b8a9b1799d002f2dba0d61c185514_JaffaCakes118

  • Size

    10KB

  • Sample

    240708-jqhq2azakp

  • MD5

    2b8b8a9b1799d002f2dba0d61c185514

  • SHA1

    c9968eb6861ee29aafd12e396c454a7c4ea5b6da

  • SHA256

    256d21ae8f5e724d7e1a0204c8a62caac908ba9db978b8b75b3bd8e09a3544a1

  • SHA512

    a39dc14a2e953f0a8ee96bb885450d7a6f31609832aeebbcb327abbdf5acf03ee1d74dd18a44a0cb2245a7dc405f43038138f7ec06a77f28741fa7ca6b6a1391

  • SSDEEP

    192:OLsu9niHiq5HL4+v6+S+8egpnWwnRlo9OYdUcvfZcGZrtJOLWUnSetwbHlALT:OodiqW+v5Sh9lWwRUBKcvfZhF0k0

Malware Config

Targets

    • Target

      2b8b8a9b1799d002f2dba0d61c185514_JaffaCakes118

    • Size

      10KB

    • MD5

      2b8b8a9b1799d002f2dba0d61c185514

    • SHA1

      c9968eb6861ee29aafd12e396c454a7c4ea5b6da

    • SHA256

      256d21ae8f5e724d7e1a0204c8a62caac908ba9db978b8b75b3bd8e09a3544a1

    • SHA512

      a39dc14a2e953f0a8ee96bb885450d7a6f31609832aeebbcb327abbdf5acf03ee1d74dd18a44a0cb2245a7dc405f43038138f7ec06a77f28741fa7ca6b6a1391

    • SSDEEP

      192:OLsu9niHiq5HL4+v6+S+8egpnWwnRlo9OYdUcvfZcGZrtJOLWUnSetwbHlALT:OodiqW+v5Sh9lWwRUBKcvfZhF0k0

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks