General

  • Target

    5bcf0f37305ebce0fdfc50ab5248538e_JaffaCakes118

  • Size

    627KB

  • Sample

    240719-nw4ynszakl

  • MD5

    5bcf0f37305ebce0fdfc50ab5248538e

  • SHA1

    7f745e4bc25108537f4101e4f2d2875e1ecd7641

  • SHA256

    e04d1bc1055fc9b59d08eccc069d07678bd60d3118060ba8749878ef3ede996e

  • SHA512

    402b06fb5f53eaebac9b9e0bca4dddfa903f7caf93a7c8aa1866a6f999304bd366fd262226ae2adebf11ba697d57b28f2efd38293f5db6f4578b10de8dd1b588

  • SSDEEP

    12288:9Ahs6qnD9jMttVYiNFJ8bybqxkbYEH3ubNaPq7VUWrsfKL5qyn3ly6YH:+btt2kVMkbju5qWrsfKL5Tly6c

Score
10/10

Malware Config

Targets

    • Target

      5bcf0f37305ebce0fdfc50ab5248538e_JaffaCakes118

    • Size

      627KB

    • MD5

      5bcf0f37305ebce0fdfc50ab5248538e

    • SHA1

      7f745e4bc25108537f4101e4f2d2875e1ecd7641

    • SHA256

      e04d1bc1055fc9b59d08eccc069d07678bd60d3118060ba8749878ef3ede996e

    • SHA512

      402b06fb5f53eaebac9b9e0bca4dddfa903f7caf93a7c8aa1866a6f999304bd366fd262226ae2adebf11ba697d57b28f2efd38293f5db6f4578b10de8dd1b588

    • SSDEEP

      12288:9Ahs6qnD9jMttVYiNFJ8bybqxkbYEH3ubNaPq7VUWrsfKL5qyn3ly6YH:+btt2kVMkbju5qWrsfKL5Tly6c

    Score
    10/10
    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks