General

  • Target

    9599e545c9912677c6ae8c9d70e74bc5_JaffaCakes118

  • Size

    10KB

  • Sample

    240814-lxn8ha1akl

  • MD5

    9599e545c9912677c6ae8c9d70e74bc5

  • SHA1

    bcf3599dcdc0763d1e97e012b83493e6c33a02df

  • SHA256

    cd4992a20aad278d73ef74c7ddc9a021ecab96aecb133c74f0da0a7a3e90f5a1

  • SHA512

    1e87169524e85842f0ae7f487273ae1f9acea8f7c1e88ef211436a13d6afb41dc4241f7b247c8b4fdda56161cecb76317e97d3382b88883b32de93d0abe83624

  • SSDEEP

    192:nIysA/4ZJDPuuxDQNQ2spwlqZif/R/J9a+GGzDw3dD+l2+D2Dg+:nIysAwZJWNNvVqZkRjNDDKdD+lBD2s+

Malware Config

Targets

    • Target

      9599e545c9912677c6ae8c9d70e74bc5_JaffaCakes118

    • Size

      10KB

    • MD5

      9599e545c9912677c6ae8c9d70e74bc5

    • SHA1

      bcf3599dcdc0763d1e97e012b83493e6c33a02df

    • SHA256

      cd4992a20aad278d73ef74c7ddc9a021ecab96aecb133c74f0da0a7a3e90f5a1

    • SHA512

      1e87169524e85842f0ae7f487273ae1f9acea8f7c1e88ef211436a13d6afb41dc4241f7b247c8b4fdda56161cecb76317e97d3382b88883b32de93d0abe83624

    • SSDEEP

      192:nIysA/4ZJDPuuxDQNQ2spwlqZif/R/J9a+GGzDw3dD+l2+D2Dg+:nIysAwZJWNNvVqZkRjNDDKdD+lBD2s+

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks