General

  • Target

    6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118

  • Size

    10KB

  • Sample

    240723-17dbbasajj

  • MD5

    6929e0d64b157d321e84f95ef2a8e087

  • SHA1

    9545d50c4a180ad30ab83a8e697429469238bd58

  • SHA256

    a8db3803e1f827f739e066041740fe9641c0b8ae45d9e1d1a2a2c13cea515bc6

  • SHA512

    80b010f60ac40ce0a19e9d5e1dc08558fee0dd6a1719776e9bec6b4bcbf15d70badc9dd3c7f15ce06704ad86ba05a8324c17158b3f81f876bf31c328b2bd9415

  • SSDEEP

    192:K4XuJaaKhJAUqeHAZiJW57IdHIGQwTDgyZDNf0qiRNbu7+:hS09gZiWllIDxuVy+

Malware Config

Targets

    • Target

      6929e0d64b157d321e84f95ef2a8e087_JaffaCakes118

    • Size

      10KB

    • MD5

      6929e0d64b157d321e84f95ef2a8e087

    • SHA1

      9545d50c4a180ad30ab83a8e697429469238bd58

    • SHA256

      a8db3803e1f827f739e066041740fe9641c0b8ae45d9e1d1a2a2c13cea515bc6

    • SHA512

      80b010f60ac40ce0a19e9d5e1dc08558fee0dd6a1719776e9bec6b4bcbf15d70badc9dd3c7f15ce06704ad86ba05a8324c17158b3f81f876bf31c328b2bd9415

    • SSDEEP

      192:K4XuJaaKhJAUqeHAZiJW57IdHIGQwTDgyZDNf0qiRNbu7+:hS09gZiWllIDxuVy+

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks