General

  • Target

    3eafed9d8fa5b65425dd61a03d893769_JaffaCakes118

  • Size

    136KB

  • Sample

    240712-yq66yszgrb

  • MD5

    3eafed9d8fa5b65425dd61a03d893769

  • SHA1

    38425d40bfc333f4cfa71e639576bf6f4175c924

  • SHA256

    4968589501bf18935b4b6536d42192595131e997e1da031958ff199e2bdda1d0

  • SHA512

    465aff064853f97016628e2dd39e17873616466d338d1de22e0a17ac1eb1e159d74c8ac74dda5b3d1eaed19e593ab5f51a771fa61cf398c9c2c3e0bcda16dd37

  • SSDEEP

    3072:dc1OW8a11OTGW8kTPeZIrBXlMhsQnA95o4lKbDC23p5:XW8a11I8kTPCuX+xu5o4lK/9p

Score
8/10

Malware Config

Targets

    • Target

      3eafed9d8fa5b65425dd61a03d893769_JaffaCakes118

    • Size

      136KB

    • MD5

      3eafed9d8fa5b65425dd61a03d893769

    • SHA1

      38425d40bfc333f4cfa71e639576bf6f4175c924

    • SHA256

      4968589501bf18935b4b6536d42192595131e997e1da031958ff199e2bdda1d0

    • SHA512

      465aff064853f97016628e2dd39e17873616466d338d1de22e0a17ac1eb1e159d74c8ac74dda5b3d1eaed19e593ab5f51a771fa61cf398c9c2c3e0bcda16dd37

    • SSDEEP

      3072:dc1OW8a11OTGW8kTPeZIrBXlMhsQnA95o4lKbDC23p5:XW8a11I8kTPCuX+xu5o4lK/9p

    Score
    8/10
    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks