General

  • Target

    46b494521dd35d426e32a5bd21864e53_JaffaCakes118

  • Size

    12KB

  • Sample

    240714-vf6wna1gpa

  • MD5

    46b494521dd35d426e32a5bd21864e53

  • SHA1

    4718fe51fd0fcd257379c03aa56650e624c3a0af

  • SHA256

    1c224ce4992ecca7cdcfbacc825677335bb73a397c4451c2ac8c888b14140bed

  • SHA512

    ea9ac0c4f6af1bd6411f1aa7781a2bcafca3f6674889b280610e15ab80a26a977189bd16834fc8ce6785a6fdace36eab4889ff1ec2f46fdfb0c06608c37900af

  • SSDEEP

    192:UoQI2DE9EJ5g2GXWzX6qexxZceKPl4iT4jMBi6Ktq0zcMideTHkEtJ2LzP:Uov9Es2qWzXgxxZ6PCm4jMi1qNut+LD

Malware Config

Targets

    • Target

      46b494521dd35d426e32a5bd21864e53_JaffaCakes118

    • Size

      12KB

    • MD5

      46b494521dd35d426e32a5bd21864e53

    • SHA1

      4718fe51fd0fcd257379c03aa56650e624c3a0af

    • SHA256

      1c224ce4992ecca7cdcfbacc825677335bb73a397c4451c2ac8c888b14140bed

    • SHA512

      ea9ac0c4f6af1bd6411f1aa7781a2bcafca3f6674889b280610e15ab80a26a977189bd16834fc8ce6785a6fdace36eab4889ff1ec2f46fdfb0c06608c37900af

    • SSDEEP

      192:UoQI2DE9EJ5g2GXWzX6qexxZceKPl4iT4jMBi6Ktq0zcMideTHkEtJ2LzP:Uov9Es2qWzXgxxZ6PCm4jMi1qNut+LD

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks