General

  • Target

    36120cbae5e3327520bc302ace275db6_JaffaCakes118

  • Size

    12KB

  • Sample

    240710-x6c3dawbmp

  • MD5

    36120cbae5e3327520bc302ace275db6

  • SHA1

    bd33473da72948ef5c742e54af1447fe4a791497

  • SHA256

    f20da7b9a19bfb667d78de8e7626a27108d133031f7c2838a9b3820362d665f6

  • SHA512

    7916abf31bb58f1128ed95eb3f455012b017e97414267627d189e68f7d27f4808a580f9d633e2169ae60fa27b2f8c8c105c103effdaa47e6e3d6ab6a8155f4c6

  • SSDEEP

    192:rzv5ZySkiMiuM2RCS22KpaiVbVMtPuKTZeR3eKUzGyodmnedpUTl2/:nv5oSLMiuM2Rb2vpNV2YH3eBGzdmnejl

Malware Config

Targets

    • Target

      36120cbae5e3327520bc302ace275db6_JaffaCakes118

    • Size

      12KB

    • MD5

      36120cbae5e3327520bc302ace275db6

    • SHA1

      bd33473da72948ef5c742e54af1447fe4a791497

    • SHA256

      f20da7b9a19bfb667d78de8e7626a27108d133031f7c2838a9b3820362d665f6

    • SHA512

      7916abf31bb58f1128ed95eb3f455012b017e97414267627d189e68f7d27f4808a580f9d633e2169ae60fa27b2f8c8c105c103effdaa47e6e3d6ab6a8155f4c6

    • SSDEEP

      192:rzv5ZySkiMiuM2RCS22KpaiVbVMtPuKTZeR3eKUzGyodmnedpUTl2/:nv5oSLMiuM2Rb2vpNV2YH3eBGzdmnejl

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks