General

  • Target

    2da4b559090f0bc385076e06fde020f7_JaffaCakes118

  • Size

    10KB

  • Sample

    240708-ywa1pswfqk

  • MD5

    2da4b559090f0bc385076e06fde020f7

  • SHA1

    91a8e5bcafbb2b4b2204f8b5986b2a3fc5ad5631

  • SHA256

    bbb48cfcd2b9e631119d70a4395a2ab356589affe678afc20884674971603493

  • SHA512

    2a74b2ad1914f477bbb1664cfc4db64ef6c2d5b9902d1e3463c8dd37a022cb18d7286f9a1cc4d2d4e770c390ec0e4f27f9e6e685d04d53cbe815820c73972446

  • SSDEEP

    192:8eDuFSHP37IQsDocCg3wPjdadrLVc7PG1KnoeSjKSBH18rzorScoBV3Z:XKSvrIQsD1APjdadrBEoHR1uosp

Malware Config

Targets

    • Target

      2da4b559090f0bc385076e06fde020f7_JaffaCakes118

    • Size

      10KB

    • MD5

      2da4b559090f0bc385076e06fde020f7

    • SHA1

      91a8e5bcafbb2b4b2204f8b5986b2a3fc5ad5631

    • SHA256

      bbb48cfcd2b9e631119d70a4395a2ab356589affe678afc20884674971603493

    • SHA512

      2a74b2ad1914f477bbb1664cfc4db64ef6c2d5b9902d1e3463c8dd37a022cb18d7286f9a1cc4d2d4e770c390ec0e4f27f9e6e685d04d53cbe815820c73972446

    • SSDEEP

      192:8eDuFSHP37IQsDocCg3wPjdadrLVc7PG1KnoeSjKSBH18rzorScoBV3Z:XKSvrIQsD1APjdadrBEoHR1uosp

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks