General

  • Target

    6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118

  • Size

    254KB

  • Sample

    240722-nspdtawgjl

  • MD5

    6315b3bde2f9c4f4f20c43ce0c9100c7

  • SHA1

    362c5f747b32631834fa284f0972211cb22101a4

  • SHA256

    856cb94672286d55c3a80cc715bc0cc70bcf6048e8e866bb2d06d57a86e03061

  • SHA512

    583eb22ced77b19b6ba48c50badb794de5c64268ab29dfe192f0d99861cb2a5fb34f701ba3b2216b0e9d62f7997ff4b6b5f9449ab40ff8e95793824f92f9f29b

  • SSDEEP

    6144:kR3S2aGoaW84vazVVYC0caMEL1wM1VHKa/vz:kRiUoaHfIhwqVfL

Score
7/10

Malware Config

Targets

    • Target

      6315b3bde2f9c4f4f20c43ce0c9100c7_JaffaCakes118

    • Size

      254KB

    • MD5

      6315b3bde2f9c4f4f20c43ce0c9100c7

    • SHA1

      362c5f747b32631834fa284f0972211cb22101a4

    • SHA256

      856cb94672286d55c3a80cc715bc0cc70bcf6048e8e866bb2d06d57a86e03061

    • SHA512

      583eb22ced77b19b6ba48c50badb794de5c64268ab29dfe192f0d99861cb2a5fb34f701ba3b2216b0e9d62f7997ff4b6b5f9449ab40ff8e95793824f92f9f29b

    • SSDEEP

      6144:kR3S2aGoaW84vazVVYC0caMEL1wM1VHKa/vz:kRiUoaHfIhwqVfL

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks