General

  • Target

    60cd99f4ab8f8af58dde5d4cd96093b0_JaffaCakes118

  • Size

    42KB

  • Sample

    240721-waytjazakk

  • MD5

    60cd99f4ab8f8af58dde5d4cd96093b0

  • SHA1

    f26b549556957bac480d513e3ecbc1481263f8c1

  • SHA256

    d530d9ec9b0916db7ef5b625e2571cd08c36ef0b980d28b7628b4f771ddad211

  • SHA512

    f6fcf99d2f6966fb4f40459e90c5d0bda287c6cc49e51983664dc67cc2d6151fb14d852f0b3f77372fc65d9b20d0fe172ed54d3d8c154fa0ae33c02b17634da8

  • SSDEEP

    768:1KMGEOfhx12BIG12VYOqVZ85SpzwPm4ZAfdP1jpiomO3j97k:1ZIhXmKqM5xeAAfd7ioN3B7k

Score
7/10

Malware Config

Targets

    • Target

      60cd99f4ab8f8af58dde5d4cd96093b0_JaffaCakes118

    • Size

      42KB

    • MD5

      60cd99f4ab8f8af58dde5d4cd96093b0

    • SHA1

      f26b549556957bac480d513e3ecbc1481263f8c1

    • SHA256

      d530d9ec9b0916db7ef5b625e2571cd08c36ef0b980d28b7628b4f771ddad211

    • SHA512

      f6fcf99d2f6966fb4f40459e90c5d0bda287c6cc49e51983664dc67cc2d6151fb14d852f0b3f77372fc65d9b20d0fe172ed54d3d8c154fa0ae33c02b17634da8

    • SSDEEP

      768:1KMGEOfhx12BIG12VYOqVZ85SpzwPm4ZAfdP1jpiomO3j97k:1ZIhXmKqM5xeAAfd7ioN3B7k

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks