General

  • Target

    445f84bb85b3adb0b10ddbf19dca8722_JaffaCakes118

  • Size

    13KB

  • Sample

    240714-ff18vazcjc

  • MD5

    445f84bb85b3adb0b10ddbf19dca8722

  • SHA1

    c4a4c9c753d5f20ce763e7878bc1b069a4c51330

  • SHA256

    3305ace4b88f14bec787c580c5c5646b498f2e0afc756990828c3689bd9a4db7

  • SHA512

    eedb0a4fdeb9a3618c9da18944e2bce44f774f77f4a1bfa44c97626d8421323877c4493c90a20f9cdd095d6434aff47ec43badd46d8e2e1045035149e923aa9e

  • SSDEEP

    192:kg3H6KuyrY3VvkLJDqTIOL1NGrWqyviL9TWIGyooMhN2Up8Ts7oU4xDng8X/:968wTImNGiLORWIG3428TdHNv

Malware Config

Targets

    • Target

      445f84bb85b3adb0b10ddbf19dca8722_JaffaCakes118

    • Size

      13KB

    • MD5

      445f84bb85b3adb0b10ddbf19dca8722

    • SHA1

      c4a4c9c753d5f20ce763e7878bc1b069a4c51330

    • SHA256

      3305ace4b88f14bec787c580c5c5646b498f2e0afc756990828c3689bd9a4db7

    • SHA512

      eedb0a4fdeb9a3618c9da18944e2bce44f774f77f4a1bfa44c97626d8421323877c4493c90a20f9cdd095d6434aff47ec43badd46d8e2e1045035149e923aa9e

    • SSDEEP

      192:kg3H6KuyrY3VvkLJDqTIOL1NGrWqyviL9TWIGyooMhN2Up8Ts7oU4xDng8X/:968wTImNGiLORWIG3428TdHNv

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks