General

  • Target

    5c8845659f127c90e5de08d9b97bfbb3_JaffaCakes118

  • Size

    640KB

  • Sample

    240719-sv64vsxgjr

  • MD5

    5c8845659f127c90e5de08d9b97bfbb3

  • SHA1

    1ff38db5c85ab5f85f8736b5514c6b92a5c3c08c

  • SHA256

    de4b75a5dd3cf4836fb0693fe5c597a0423e6f78a11c97eda627a43fe34284d1

  • SHA512

    4c49178a4fd52c7ad0c12dd8906b50d5582ae4e9c868104a9f162a236ae220cdff1c37b849d8f1c0a54ce6ab886077858b48786068bbee9ffbc6db717bef9807

  • SSDEEP

    12288:ZETVZyyvHtauvpRpdpahWafLYa/gf1c2obY7EN1s:Zeoyla2rv/oc4bs

Score
7/10

Malware Config

Targets

    • Target

      5c8845659f127c90e5de08d9b97bfbb3_JaffaCakes118

    • Size

      640KB

    • MD5

      5c8845659f127c90e5de08d9b97bfbb3

    • SHA1

      1ff38db5c85ab5f85f8736b5514c6b92a5c3c08c

    • SHA256

      de4b75a5dd3cf4836fb0693fe5c597a0423e6f78a11c97eda627a43fe34284d1

    • SHA512

      4c49178a4fd52c7ad0c12dd8906b50d5582ae4e9c868104a9f162a236ae220cdff1c37b849d8f1c0a54ce6ab886077858b48786068bbee9ffbc6db717bef9807

    • SSDEEP

      12288:ZETVZyyvHtauvpRpdpahWafLYa/gf1c2obY7EN1s:Zeoyla2rv/oc4bs

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks