General

  • Target

    774505aa52d44154480727b8194f60b3_JaffaCakes118

  • Size

    11KB

  • Sample

    240727-hnkl6swakh

  • MD5

    774505aa52d44154480727b8194f60b3

  • SHA1

    d9ceef1e1cc88a2da3f2672b5468319eab7e090c

  • SHA256

    c7c9e303035e7f62c5fba72e15d271cbc09bf626a9e26124a96d7a2fa993079f

  • SHA512

    400cdda9179d8d2086b5087ecfe381b27f64b38bad22ebfe18fead1e1f704c765eff873b61e75c13e922665a6c6c11fdd6ed972fa05cfd67b4f8bc2f5306041a

  • SSDEEP

    192:BaMLRkP1rpksa9X1XIsHqFtaQFP9CjKCueTsL+EAAo0728/8gOuqUVeO/:BVLiNrSXX1YhFXMjKCue2MAXb+l6

Malware Config

Targets

    • Target

      774505aa52d44154480727b8194f60b3_JaffaCakes118

    • Size

      11KB

    • MD5

      774505aa52d44154480727b8194f60b3

    • SHA1

      d9ceef1e1cc88a2da3f2672b5468319eab7e090c

    • SHA256

      c7c9e303035e7f62c5fba72e15d271cbc09bf626a9e26124a96d7a2fa993079f

    • SHA512

      400cdda9179d8d2086b5087ecfe381b27f64b38bad22ebfe18fead1e1f704c765eff873b61e75c13e922665a6c6c11fdd6ed972fa05cfd67b4f8bc2f5306041a

    • SSDEEP

      192:BaMLRkP1rpksa9X1XIsHqFtaQFP9CjKCueTsL+EAAo0728/8gOuqUVeO/:BVLiNrSXX1YhFXMjKCue2MAXb+l6

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks