General

  • Target

    86350288a6e2dd55bd1a1291e86e96fb_JaffaCakes118

  • Size

    10KB

  • Sample

    240810-qkp2gsvgkc

  • MD5

    86350288a6e2dd55bd1a1291e86e96fb

  • SHA1

    e60caf7f031ea53a8f12d857f8992fb9e2184f33

  • SHA256

    87a40c42865d17b58488acb9c6c4c78fa4623f689db601729e170ede5e02ef31

  • SHA512

    82010628d6e3c72af8392dfd66e7db3396e781e55e17d94dc7f5954618f5625da9cafafcd5b213c89f53040df0db249db83272b98bf424633d068361acb28173

  • SSDEEP

    192:sMyzw/YUrO/TIbHCBxjExaD1+vPZPBrKPU9QWRTtgQV74YanSjxSSg:sMyzw/rO/TKpxG+vRPRKM7jggRJg

Malware Config

Targets

    • Target

      86350288a6e2dd55bd1a1291e86e96fb_JaffaCakes118

    • Size

      10KB

    • MD5

      86350288a6e2dd55bd1a1291e86e96fb

    • SHA1

      e60caf7f031ea53a8f12d857f8992fb9e2184f33

    • SHA256

      87a40c42865d17b58488acb9c6c4c78fa4623f689db601729e170ede5e02ef31

    • SHA512

      82010628d6e3c72af8392dfd66e7db3396e781e55e17d94dc7f5954618f5625da9cafafcd5b213c89f53040df0db249db83272b98bf424633d068361acb28173

    • SSDEEP

      192:sMyzw/YUrO/TIbHCBxjExaD1+vPZPBrKPU9QWRTtgQV74YanSjxSSg:sMyzw/rO/TKpxG+vRPRKM7jggRJg

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks