General

  • Target

    5c6a272ee70babda79c1e6c8268e51ea_JaffaCakes118

  • Size

    64KB

  • Sample

    240719-r9nemazepc

  • MD5

    5c6a272ee70babda79c1e6c8268e51ea

  • SHA1

    b5603e07780c5ab4e8696be09da8b49b28245851

  • SHA256

    e96fd13e6b1799ee509496d5340891e202c5e7afea46ce8c8f6a715123d45b5f

  • SHA512

    9936c041062f7023e9046b979d9709b1ca8d20d06793aebe8c973dbb4f3a8553b3fce4be5516666daa47eaa4c467c9dadc50ff84039fd39f79dcab70b0086583

  • SSDEEP

    1536:CFIr+g+/9TBoZUe88L8Y75AmeXsGUG09SL4i7/1uJvgH:CBb9JrYNAmt9e4vJ4

Score
7/10

Malware Config

Targets

    • Target

      5c6a272ee70babda79c1e6c8268e51ea_JaffaCakes118

    • Size

      64KB

    • MD5

      5c6a272ee70babda79c1e6c8268e51ea

    • SHA1

      b5603e07780c5ab4e8696be09da8b49b28245851

    • SHA256

      e96fd13e6b1799ee509496d5340891e202c5e7afea46ce8c8f6a715123d45b5f

    • SHA512

      9936c041062f7023e9046b979d9709b1ca8d20d06793aebe8c973dbb4f3a8553b3fce4be5516666daa47eaa4c467c9dadc50ff84039fd39f79dcab70b0086583

    • SSDEEP

      1536:CFIr+g+/9TBoZUe88L8Y75AmeXsGUG09SL4i7/1uJvgH:CBb9JrYNAmt9e4vJ4

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks