General

  • Target

    429298ccfa4668eedbc86580c36febe2_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240713-vj6p3a1gmf

  • MD5

    429298ccfa4668eedbc86580c36febe2

  • SHA1

    784216dae93eca0f1114cc102777ad08ea1a39da

  • SHA256

    55debfd8fa5aec78c05795c8e07e173ee25e513853cf8527b5706fefb43d25b3

  • SHA512

    b4b154317fa62fd09533003b4143346e0c912b8184b846a3a3f49473ef64508afae43f66184c534d059ec4b777872c2713822d03baddf40a4c64775f040abec9

  • SSDEEP

    49152:KZqFJ5S4vmQsOmhp92EZgxKGAte5ZPZ2e:oqFJ5S4vEOmhp92jKjUZp

Score
8/10

Malware Config

Targets

    • Target

      429298ccfa4668eedbc86580c36febe2_JaffaCakes118

    • Size

      1.6MB

    • MD5

      429298ccfa4668eedbc86580c36febe2

    • SHA1

      784216dae93eca0f1114cc102777ad08ea1a39da

    • SHA256

      55debfd8fa5aec78c05795c8e07e173ee25e513853cf8527b5706fefb43d25b3

    • SHA512

      b4b154317fa62fd09533003b4143346e0c912b8184b846a3a3f49473ef64508afae43f66184c534d059ec4b777872c2713822d03baddf40a4c64775f040abec9

    • SSDEEP

      49152:KZqFJ5S4vmQsOmhp92EZgxKGAte5ZPZ2e:oqFJ5S4vEOmhp92jKjUZp

    Score
    8/10
    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks