General

  • Target

    4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118

  • Size

    11KB

  • Sample

    240714-qzxpwasfpl

  • MD5

    4610f61f6f542b457ee4aa391bdb5ae9

  • SHA1

    e271a1ca50fe04554ef9ab982f5e3918d9490fb9

  • SHA256

    7c08754a90a54e8ff5f33c02d83a5de7807d99fe26c66941c6fe6e73a18cadca

  • SHA512

    e9ebdc5370c36d10abcb548ba067ead06f09bea470c9e7a6669e4e9166046891fcc5da9cd587b0d2db2b1b42d1f22de58fb28e83027636392368db3ca9882edb

  • SSDEEP

    192:NErlncuFLrflfLN8EMOGk0XhhT09GP1sHOEF/NKI2mvwl3LQpc5:NErln5dWEjGk0XGsEpcZnx

Malware Config

Targets

    • Target

      4610f61f6f542b457ee4aa391bdb5ae9_JaffaCakes118

    • Size

      11KB

    • MD5

      4610f61f6f542b457ee4aa391bdb5ae9

    • SHA1

      e271a1ca50fe04554ef9ab982f5e3918d9490fb9

    • SHA256

      7c08754a90a54e8ff5f33c02d83a5de7807d99fe26c66941c6fe6e73a18cadca

    • SHA512

      e9ebdc5370c36d10abcb548ba067ead06f09bea470c9e7a6669e4e9166046891fcc5da9cd587b0d2db2b1b42d1f22de58fb28e83027636392368db3ca9882edb

    • SSDEEP

      192:NErlncuFLrflfLN8EMOGk0XhhT09GP1sHOEF/NKI2mvwl3LQpc5:NErln5dWEjGk0XGsEpcZnx

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks