General

  • Target

    3f42e1b99cacb148cb69eac9d0dc5138_JaffaCakes118

  • Size

    10KB

  • Sample

    240712-29gl7avdqr

  • MD5

    3f42e1b99cacb148cb69eac9d0dc5138

  • SHA1

    777c6974d7c837a4a5f669d8d04ad20a0dd0e2e4

  • SHA256

    fed518ba945b74371343034f55e793bc7755f3e8915183cb576d632222539423

  • SHA512

    6f7ca93ab13a4434546c697814b7d812acef323afc73f1f6881e5bbd9879e8074d4fa4ff01249d95a4e5761322238669c5a82c077d6545b47d02a6cdde73dd37

  • SSDEEP

    192:Ryw1qv+F7pQtH5dWVJLD9popPzvKx1jRN6TDzi/6DGLdtYNscLbf+OHTTFZ:IwWg7pQtHDYLD0p2n+DO/I6YNXbjzr

Malware Config

Targets

    • Target

      3f42e1b99cacb148cb69eac9d0dc5138_JaffaCakes118

    • Size

      10KB

    • MD5

      3f42e1b99cacb148cb69eac9d0dc5138

    • SHA1

      777c6974d7c837a4a5f669d8d04ad20a0dd0e2e4

    • SHA256

      fed518ba945b74371343034f55e793bc7755f3e8915183cb576d632222539423

    • SHA512

      6f7ca93ab13a4434546c697814b7d812acef323afc73f1f6881e5bbd9879e8074d4fa4ff01249d95a4e5761322238669c5a82c077d6545b47d02a6cdde73dd37

    • SSDEEP

      192:Ryw1qv+F7pQtH5dWVJLD9popPzvKx1jRN6TDzi/6DGLdtYNscLbf+OHTTFZ:IwWg7pQtHDYLD0p2n+DO/I6YNXbjzr

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks