General

  • Target

    635826c1ec5c79daa58efc6a37034303_JaffaCakes118

  • Size

    153KB

  • Sample

    240722-qn8b8szgrp

  • MD5

    635826c1ec5c79daa58efc6a37034303

  • SHA1

    300db348a661ea41bf51ae69bfbc54c6c656be5a

  • SHA256

    a6486a4304b87e6f4ed0abe82863bbe4e27ccdb42b74ea3e9e3e94f67ea1e606

  • SHA512

    92d555a4ebf78867964acc3767e3f34941d225bdf14b5294ecd845d0c3dcacafccef92c1d8948dce193c0ac78a073aa595bdb8711fb47fcb15bc80d75a72066a

  • SSDEEP

    3072:pCqCGHLvAo/mpG4VakM3WDTdBmE6XYCA4KfdG:peiLvIvW3WDhBm79KlG

Score
8/10

Malware Config

Targets

    • Target

      635826c1ec5c79daa58efc6a37034303_JaffaCakes118

    • Size

      153KB

    • MD5

      635826c1ec5c79daa58efc6a37034303

    • SHA1

      300db348a661ea41bf51ae69bfbc54c6c656be5a

    • SHA256

      a6486a4304b87e6f4ed0abe82863bbe4e27ccdb42b74ea3e9e3e94f67ea1e606

    • SHA512

      92d555a4ebf78867964acc3767e3f34941d225bdf14b5294ecd845d0c3dcacafccef92c1d8948dce193c0ac78a073aa595bdb8711fb47fcb15bc80d75a72066a

    • SSDEEP

      3072:pCqCGHLvAo/mpG4VakM3WDTdBmE6XYCA4KfdG:peiLvIvW3WDhBm79KlG

    Score
    8/10
    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks