General

  • Target

    5d6ff1baea71e17c6865b177298e8265_JaffaCakes118

  • Size

    407KB

  • Sample

    240719-yl534azhrb

  • MD5

    5d6ff1baea71e17c6865b177298e8265

  • SHA1

    0326f6851f0b8e0abd016e2ba3f81006c0169845

  • SHA256

    1221a0330e4b3e2b3b140bf903e82cd2558f6d6e44403cc1d42a322a3f08487a

  • SHA512

    d3914308d0b51ad94a704ffa9198a62a284a4526f6af2f3065479fbc68c497c9c440a1636e35bacd66f6f73cb06bc27fb92a47d06f34fd3fffa88d123c364902

  • SSDEEP

    12288:4eMpPonkZ6gUPXtmnO0lmH1a11Ukso6DtY0Iqjvg+:/Sok9omnjlw8PcYNMvX

Score
8/10

Malware Config

Targets

    • Target

      5d6ff1baea71e17c6865b177298e8265_JaffaCakes118

    • Size

      407KB

    • MD5

      5d6ff1baea71e17c6865b177298e8265

    • SHA1

      0326f6851f0b8e0abd016e2ba3f81006c0169845

    • SHA256

      1221a0330e4b3e2b3b140bf903e82cd2558f6d6e44403cc1d42a322a3f08487a

    • SHA512

      d3914308d0b51ad94a704ffa9198a62a284a4526f6af2f3065479fbc68c497c9c440a1636e35bacd66f6f73cb06bc27fb92a47d06f34fd3fffa88d123c364902

    • SSDEEP

      12288:4eMpPonkZ6gUPXtmnO0lmH1a11Ukso6DtY0Iqjvg+:/Sok9omnjlw8PcYNMvX

    Score
    8/10
    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Molebox Virtualization software

      Detects file using Molebox Virtualization software.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks