General

  • Target

    68ac89d923cda397a728aa57958538e8_JaffaCakes118

  • Size

    13KB

  • Sample

    240723-yhk9hsxdpd

  • MD5

    68ac89d923cda397a728aa57958538e8

  • SHA1

    ac109d3ed3cdf2012cf37a3823d9d1ae700ef14d

  • SHA256

    c34bc0d385e3402f21d75310a3b79e0e4ad7942c601494c85f215e0eb7a7fe1f

  • SHA512

    91db99678f5ec137901c14255a2deca981e755c2885f82d0301c6082a029f4566ead4758a971c9bc8083dd36c9f3e2c27f26b0a03faba5f55e0f5e34c78a3206

  • SSDEEP

    192:OvtBPQNgnouH+22mvT+QcomdJgFplBQwYrzutXJHmmCvttMlfr5WBVumt9Se3:OTcgnoujqddJ+NAutI3tt2rIHbd

Malware Config

Targets

    • Target

      68ac89d923cda397a728aa57958538e8_JaffaCakes118

    • Size

      13KB

    • MD5

      68ac89d923cda397a728aa57958538e8

    • SHA1

      ac109d3ed3cdf2012cf37a3823d9d1ae700ef14d

    • SHA256

      c34bc0d385e3402f21d75310a3b79e0e4ad7942c601494c85f215e0eb7a7fe1f

    • SHA512

      91db99678f5ec137901c14255a2deca981e755c2885f82d0301c6082a029f4566ead4758a971c9bc8083dd36c9f3e2c27f26b0a03faba5f55e0f5e34c78a3206

    • SSDEEP

      192:OvtBPQNgnouH+22mvT+QcomdJgFplBQwYrzutXJHmmCvttMlfr5WBVumt9Se3:OTcgnoujqddJ+NAutI3tt2rIHbd

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks