General

  • Target

    48df49a7dbe5cc7a153633133a8fc9d6_JaffaCakes118

  • Size

    250KB

  • Sample

    240715-jpdexswbkn

  • MD5

    48df49a7dbe5cc7a153633133a8fc9d6

  • SHA1

    4dadf4d92648521067925f02d3e071b3fe3bbc04

  • SHA256

    cff7d4680495922e463ad6d2959179043ad882ac946bdc27026d28c95384bb4b

  • SHA512

    3f7a0680ef43584464394419cb4dc21a90f09357d86c1de8f134afeb564d6ef1297a5b087af51a55783d3b196547ba4ce5230a1bf28e74ede45d025f1fa144cf

  • SSDEEP

    6144:NoxDTbg1+6B3mq4GeUaHDDwGNzDOSK/FUuQk8E2qk:GDTbg1XXeUejxiJ/m/kz

Score
7/10

Malware Config

Targets

    • Target

      48df49a7dbe5cc7a153633133a8fc9d6_JaffaCakes118

    • Size

      250KB

    • MD5

      48df49a7dbe5cc7a153633133a8fc9d6

    • SHA1

      4dadf4d92648521067925f02d3e071b3fe3bbc04

    • SHA256

      cff7d4680495922e463ad6d2959179043ad882ac946bdc27026d28c95384bb4b

    • SHA512

      3f7a0680ef43584464394419cb4dc21a90f09357d86c1de8f134afeb564d6ef1297a5b087af51a55783d3b196547ba4ce5230a1bf28e74ede45d025f1fa144cf

    • SSDEEP

      6144:NoxDTbg1+6B3mq4GeUaHDDwGNzDOSK/FUuQk8E2qk:GDTbg1XXeUejxiJ/m/kz

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks