General

  • Target

    3208da63f2d100d137ad14aa3ca1372c_JaffaCakes118

  • Size

    211KB

  • Sample

    240709-z9xbjawgqp

  • MD5

    3208da63f2d100d137ad14aa3ca1372c

  • SHA1

    a4fc695d51fceee6ca8ea71b720428e38bced179

  • SHA256

    9d6fcabeb937d988915ad3aea4231da6d925bb6973b7214c69e6fb7532fc1100

  • SHA512

    f9a5a68f441779bab5e64eb15ea11399e548f7577350d954d16df38393323677ee3b7e5cf4265f69bef9f23ffaec9b1d2e6a230f9c3348c21a038813f50e9f07

  • SSDEEP

    3072:JEUP0Fx0k4MWJjFalEadi1W0cVp86ppGeuW13PVn3F5VN4BF6dm5MBe:anXXULse

Score
7/10
upx

Malware Config

Targets

    • Target

      3208da63f2d100d137ad14aa3ca1372c_JaffaCakes118

    • Size

      211KB

    • MD5

      3208da63f2d100d137ad14aa3ca1372c

    • SHA1

      a4fc695d51fceee6ca8ea71b720428e38bced179

    • SHA256

      9d6fcabeb937d988915ad3aea4231da6d925bb6973b7214c69e6fb7532fc1100

    • SHA512

      f9a5a68f441779bab5e64eb15ea11399e548f7577350d954d16df38393323677ee3b7e5cf4265f69bef9f23ffaec9b1d2e6a230f9c3348c21a038813f50e9f07

    • SSDEEP

      3072:JEUP0Fx0k4MWJjFalEadi1W0cVp86ppGeuW13PVn3F5VN4BF6dm5MBe:anXXULse

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks