General

  • Target

    353e474f7b4016813bbb462798fec64f_JaffaCakes118

  • Size

    865KB

  • Sample

    240710-sjf4asxapc

  • MD5

    353e474f7b4016813bbb462798fec64f

  • SHA1

    0464cc64c8e19e42765deeeae6e3f1a46c1ed9b9

  • SHA256

    b95d3f837860a9458844193b1eb148f16865728200f62c2671ebf37644f57dff

  • SHA512

    01395ed6cd1b6cfe3a81680bcbba907c99973f63bfe15c6010dc2f78a425fc9b28587d5268220595d39b5029c0d172931ed5b2f786a85d6509b563d48a2a24de

  • SSDEEP

    24576:K/7//0x2mmB+i06g8oUsuE/pm3dw1ClFrg2Dt59e4Omb5/:gzBb06g8oj1/pmDH/59//

Malware Config

Targets

    • Target

      353e474f7b4016813bbb462798fec64f_JaffaCakes118

    • Size

      865KB

    • MD5

      353e474f7b4016813bbb462798fec64f

    • SHA1

      0464cc64c8e19e42765deeeae6e3f1a46c1ed9b9

    • SHA256

      b95d3f837860a9458844193b1eb148f16865728200f62c2671ebf37644f57dff

    • SHA512

      01395ed6cd1b6cfe3a81680bcbba907c99973f63bfe15c6010dc2f78a425fc9b28587d5268220595d39b5029c0d172931ed5b2f786a85d6509b563d48a2a24de

    • SSDEEP

      24576:K/7//0x2mmB+i06g8oUsuE/pm3dw1ClFrg2Dt59e4Omb5/:gzBb06g8oj1/pmDH/59//

    • Detects PseudoManuscrypt payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • PseudoManuscrypt

      PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks