General

  • Target

    8eccfe80fcd6a2a7ab42bb71231bd315_JaffaCakes118

  • Size

    16KB

  • Sample

    240812-p2h4ts1hkm

  • MD5

    8eccfe80fcd6a2a7ab42bb71231bd315

  • SHA1

    1e5aa40accce8ff612715003c8e24ffeb5839cae

  • SHA256

    add305aa4c084b0171f4d2a6302bb096baac5f91c3ecdf83d27c33eb2e7f36d9

  • SHA512

    627e485bd8a8024b475902d4cda896b77e9b8dfed292b5f15bad253859f388d1eabb69057962697bf7b10311e3b08a04b99769b9cc6507ee6cb8c22f96c68314

  • SSDEEP

    384:cG5Sdy4n6eG4QFUaJ6r1YqMXJwaMQrRtaEo4Xmb:cLd9G4QFnyQCaMaboN

Malware Config

Targets

    • Target

      8eccfe80fcd6a2a7ab42bb71231bd315_JaffaCakes118

    • Size

      16KB

    • MD5

      8eccfe80fcd6a2a7ab42bb71231bd315

    • SHA1

      1e5aa40accce8ff612715003c8e24ffeb5839cae

    • SHA256

      add305aa4c084b0171f4d2a6302bb096baac5f91c3ecdf83d27c33eb2e7f36d9

    • SHA512

      627e485bd8a8024b475902d4cda896b77e9b8dfed292b5f15bad253859f388d1eabb69057962697bf7b10311e3b08a04b99769b9cc6507ee6cb8c22f96c68314

    • SSDEEP

      384:cG5Sdy4n6eG4QFUaJ6r1YqMXJwaMQrRtaEo4Xmb:cLd9G4QFnyQCaMaboN

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks