General

  • Target

    5edcffa86f0e8d70678df3f97cfc84a3_JaffaCakes118

  • Size

    12KB

  • Sample

    240720-d1pz7sthrp

  • MD5

    5edcffa86f0e8d70678df3f97cfc84a3

  • SHA1

    ee21cfeec92e5d89aa42fd6ebb494d1ea47e6456

  • SHA256

    c32cd54bdfec96c8939d222987f248463cd73eb5bcb1a2cd4238cd342eb656a8

  • SHA512

    71a6c92bdead7a9be398b60ab979b3962078697ccb19ef742399fd3c45c3fa20a26d5f1469aeb44c59bc4efaa3804f3b5fc0be4b2a10e8f42d2e2f0632cb1b0d

  • SSDEEP

    192:nuApaQC704RVH4UdNSw8PIZrWE6/smX9bpAYroGsMidiGgwqW0D8EusQwtvsi5mq:ua5adHJz0IdwsmXFpAYkRgTpZu7wtiq

Malware Config

Targets

    • Target

      5edcffa86f0e8d70678df3f97cfc84a3_JaffaCakes118

    • Size

      12KB

    • MD5

      5edcffa86f0e8d70678df3f97cfc84a3

    • SHA1

      ee21cfeec92e5d89aa42fd6ebb494d1ea47e6456

    • SHA256

      c32cd54bdfec96c8939d222987f248463cd73eb5bcb1a2cd4238cd342eb656a8

    • SHA512

      71a6c92bdead7a9be398b60ab979b3962078697ccb19ef742399fd3c45c3fa20a26d5f1469aeb44c59bc4efaa3804f3b5fc0be4b2a10e8f42d2e2f0632cb1b0d

    • SSDEEP

      192:nuApaQC704RVH4UdNSw8PIZrWE6/smX9bpAYroGsMidiGgwqW0D8EusQwtvsi5mq:ua5adHJz0IdwsmXFpAYkRgTpZu7wtiq

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks