General

  • Target

    9680030bd03d17653c63b4731ee91111_JaffaCakes118

  • Size

    14KB

  • Sample

    240814-ry9hqasdqm

  • MD5

    9680030bd03d17653c63b4731ee91111

  • SHA1

    92a8a08bf05254baab19360672888a8d08c26a58

  • SHA256

    376c466871ff1fa4dbc4ab1b523fda7c71e25501f87acb7a674d20ebab2178d8

  • SHA512

    9b3638e6719f34bbcb1b8ea807abb1980bf9123cb14074f1a745aa130abd9c3baeef1334012408e622ef61f1083daf5fc661022878c0280a0ee738bbd2574f72

  • SSDEEP

    384:k4Ful4tuVdqYVTcD6OYf436uLwXLJ9EJKskAB:kT6Cg4cDy439wLsX

Malware Config

Targets

    • Target

      9680030bd03d17653c63b4731ee91111_JaffaCakes118

    • Size

      14KB

    • MD5

      9680030bd03d17653c63b4731ee91111

    • SHA1

      92a8a08bf05254baab19360672888a8d08c26a58

    • SHA256

      376c466871ff1fa4dbc4ab1b523fda7c71e25501f87acb7a674d20ebab2178d8

    • SHA512

      9b3638e6719f34bbcb1b8ea807abb1980bf9123cb14074f1a745aa130abd9c3baeef1334012408e622ef61f1083daf5fc661022878c0280a0ee738bbd2574f72

    • SSDEEP

      384:k4Ful4tuVdqYVTcD6OYf436uLwXLJ9EJKskAB:kT6Cg4cDy439wLsX

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks