General

  • Target

    2d5e422bd0dabd187b239963adbb6bd9_JaffaCakes118

  • Size

    10KB

  • Sample

    240708-w2cqdavcme

  • MD5

    2d5e422bd0dabd187b239963adbb6bd9

  • SHA1

    9dcc2dd4979b732610beace3f0ccb97be208414d

  • SHA256

    9d28236c043e77acd4550a0f50f6ceafb572f42d1934cc22f55fde05adebbd8d

  • SHA512

    dfa68b5b5a382eb7c28b2652967b29077fb168115edc64167203282c214fb49641cba3359f394681287d62ccb4836fe4627e830687b470bcfa698f71df9dcbd2

  • SSDEEP

    192:MIysA/4ZJJZUEbD7oNYW5E74TM6q227NwZn6bzu/4hvqDF70ClVeHFnDQ+:MIysAwZTZUIoNU74TDqXCZOADpplyc+

Malware Config

Targets

    • Target

      2d5e422bd0dabd187b239963adbb6bd9_JaffaCakes118

    • Size

      10KB

    • MD5

      2d5e422bd0dabd187b239963adbb6bd9

    • SHA1

      9dcc2dd4979b732610beace3f0ccb97be208414d

    • SHA256

      9d28236c043e77acd4550a0f50f6ceafb572f42d1934cc22f55fde05adebbd8d

    • SHA512

      dfa68b5b5a382eb7c28b2652967b29077fb168115edc64167203282c214fb49641cba3359f394681287d62ccb4836fe4627e830687b470bcfa698f71df9dcbd2

    • SSDEEP

      192:MIysA/4ZJJZUEbD7oNYW5E74TM6q227NwZn6bzu/4hvqDF70ClVeHFnDQ+:MIysAwZTZUIoNU74TDqXCZOADpplyc+

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks