General

  • Target

    37c69c7634f9188ab17176301f2c814e_JaffaCakes118

  • Size

    16KB

  • Sample

    240711-fkb5hszepr

  • MD5

    37c69c7634f9188ab17176301f2c814e

  • SHA1

    e829244d6ce019a1625fdd64a0fb3cc745684fc7

  • SHA256

    bc6a5364eda3842c2190fe09cce60c72479ed05db397e600e0b88cd33d2bbb1e

  • SHA512

    71e3cdc5fe8172289bbebce9c98c9c36ed4b4eb83b9b16849d9fb3091c0325761d7a642067f0aca32c9686d438a8d2e4855d3403e39be3b997e209e7704e5209

  • SSDEEP

    384:PJphoJIiHGSGkO+8PfMKLTo79P6KpeXMZ:PJpi2i7GkO+8PfMKLm6KpoM

Malware Config

Targets

    • Target

      37c69c7634f9188ab17176301f2c814e_JaffaCakes118

    • Size

      16KB

    • MD5

      37c69c7634f9188ab17176301f2c814e

    • SHA1

      e829244d6ce019a1625fdd64a0fb3cc745684fc7

    • SHA256

      bc6a5364eda3842c2190fe09cce60c72479ed05db397e600e0b88cd33d2bbb1e

    • SHA512

      71e3cdc5fe8172289bbebce9c98c9c36ed4b4eb83b9b16849d9fb3091c0325761d7a642067f0aca32c9686d438a8d2e4855d3403e39be3b997e209e7704e5209

    • SSDEEP

      384:PJphoJIiHGSGkO+8PfMKLTo79P6KpeXMZ:PJpi2i7GkO+8PfMKLm6KpoM

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks