General

  • Target

    89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118

  • Size

    44KB

  • Sample

    240811-lpd3kathjk

  • MD5

    89e2dcf559e4bd9bc246d36c3d6f64fa

  • SHA1

    07832794fe6c075e46a2215f759d83d8f764c98e

  • SHA256

    f9cecfb6bb9b3db48b74635378d45159aa4e3ff72310475c16906e37cc50caad

  • SHA512

    adbc09a0081cf2098a7869ad875ff69f50137332ea5167860edbdfa3c53a6a51e2140ad9d174d09b19e73eacc86414d74c06e07745de7f15c94309071bacbea8

  • SSDEEP

    768:QmK5yGQVKTnf7RGur6CB3bWwUTTrzcTFXVd7/lZsomuRfCxRpV8zT07R1Y3:QprQAnWCc9TrzcTl/4ombRpWzT04

Malware Config

Targets

    • Target

      89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118

    • Size

      44KB

    • MD5

      89e2dcf559e4bd9bc246d36c3d6f64fa

    • SHA1

      07832794fe6c075e46a2215f759d83d8f764c98e

    • SHA256

      f9cecfb6bb9b3db48b74635378d45159aa4e3ff72310475c16906e37cc50caad

    • SHA512

      adbc09a0081cf2098a7869ad875ff69f50137332ea5167860edbdfa3c53a6a51e2140ad9d174d09b19e73eacc86414d74c06e07745de7f15c94309071bacbea8

    • SSDEEP

      768:QmK5yGQVKTnf7RGur6CB3bWwUTTrzcTFXVd7/lZsomuRfCxRpV8zT07R1Y3:QprQAnWCc9TrzcTl/4ombRpWzT04

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks