General

  • Target

    3a971ad188719c81afa049c95e213fb8_JaffaCakes118

  • Size

    14KB

  • Sample

    240711-y54dlsvdrh

  • MD5

    3a971ad188719c81afa049c95e213fb8

  • SHA1

    e15d9f88a4f4d193d798964cef74aa0571785b1f

  • SHA256

    32c77d57f94879e8131218e43218d1d8c35402c9c7127705a106c94e39a7ea6a

  • SHA512

    4b354b755ae7374991155f505687e9ee4def63ad388d4b920d35ef98dd43b8b14611e5707a0683ff41e9c853f7edef6f3e8c9a872bc16d7d732f8571e25d0389

  • SSDEEP

    192:EawE9e6BACdbQstv7U8vAzN7aVD1xWdj7cEhvM5I21PN1PYIm4bT6aIs0vSHMfVb:Ed/wbp8z4Kd/cEhvMfaIhq21MfVIg

Malware Config

Targets

    • Target

      3a971ad188719c81afa049c95e213fb8_JaffaCakes118

    • Size

      14KB

    • MD5

      3a971ad188719c81afa049c95e213fb8

    • SHA1

      e15d9f88a4f4d193d798964cef74aa0571785b1f

    • SHA256

      32c77d57f94879e8131218e43218d1d8c35402c9c7127705a106c94e39a7ea6a

    • SHA512

      4b354b755ae7374991155f505687e9ee4def63ad388d4b920d35ef98dd43b8b14611e5707a0683ff41e9c853f7edef6f3e8c9a872bc16d7d732f8571e25d0389

    • SSDEEP

      192:EawE9e6BACdbQstv7U8vAzN7aVD1xWdj7cEhvM5I21PN1PYIm4bT6aIs0vSHMfVb:Ed/wbp8z4Kd/cEhvMfaIhq21MfVIg

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks