General

  • Target

    3c2a0e83750ce5f730fc5d68bb22d93f_JaffaCakes118

  • Size

    22KB

  • Sample

    240712-gap43azhnj

  • MD5

    3c2a0e83750ce5f730fc5d68bb22d93f

  • SHA1

    525be3e7e672cea78e070f1480e3521da9694bdd

  • SHA256

    78cb48d4f58ead0a1d6b9e20bccfd164c53a541f4476b3007b41087dea5f269b

  • SHA512

    98c9ea640f0970902528be640d4ae0fcdde70a9dba5e47e63981be580cfbe47f3543c68cfd03d14b492f5dc35ce1b4c880357002b3f9b49dabb3143079d92549

  • SSDEEP

    384:ypsSpg11+XCEuQ+M31f1AVe2NUwznHPPbMcYmszuK/UActaaKnhLIgL:aps8Cqxf1j2NUOoXzXTZ

Score
7/10
upx

Malware Config

Targets

    • Target

      3c2a0e83750ce5f730fc5d68bb22d93f_JaffaCakes118

    • Size

      22KB

    • MD5

      3c2a0e83750ce5f730fc5d68bb22d93f

    • SHA1

      525be3e7e672cea78e070f1480e3521da9694bdd

    • SHA256

      78cb48d4f58ead0a1d6b9e20bccfd164c53a541f4476b3007b41087dea5f269b

    • SHA512

      98c9ea640f0970902528be640d4ae0fcdde70a9dba5e47e63981be580cfbe47f3543c68cfd03d14b492f5dc35ce1b4c880357002b3f9b49dabb3143079d92549

    • SSDEEP

      384:ypsSpg11+XCEuQ+M31f1AVe2NUwznHPPbMcYmszuK/UActaaKnhLIgL:aps8Cqxf1j2NUOoXzXTZ

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks