General

  • Target

    a458099fc3cf62ed37054f0caeb89345_JaffaCakes118

  • Size

    11KB

  • Sample

    240817-14q31azepb

  • MD5

    a458099fc3cf62ed37054f0caeb89345

  • SHA1

    19b53f2aec14ae0175ab129ef68aa44c3d639f16

  • SHA256

    664e8b160228599efdc648741cf82d2be9900c0ebb229fa6f055376d4e832cb0

  • SHA512

    579fe293fae9840a510dda187b1d5076c1f7e675f0868502fb874d7965d1eaa581cf444ca651a096cf86057412ff30af6ffc859c7222ec33a6e2fd95c03eec21

  • SSDEEP

    192:RybC7kNSjUJbkr725edkczhQ2FXHC1glILoXJm5bEPqvnl0hmX4FtludtATbZ:IbC7kNKUmMedUWK1Gm5oPqvnl1oFtsTg

Malware Config

Targets

    • Target

      a458099fc3cf62ed37054f0caeb89345_JaffaCakes118

    • Size

      11KB

    • MD5

      a458099fc3cf62ed37054f0caeb89345

    • SHA1

      19b53f2aec14ae0175ab129ef68aa44c3d639f16

    • SHA256

      664e8b160228599efdc648741cf82d2be9900c0ebb229fa6f055376d4e832cb0

    • SHA512

      579fe293fae9840a510dda187b1d5076c1f7e675f0868502fb874d7965d1eaa581cf444ca651a096cf86057412ff30af6ffc859c7222ec33a6e2fd95c03eec21

    • SSDEEP

      192:RybC7kNSjUJbkr725edkczhQ2FXHC1glILoXJm5bEPqvnl0hmX4FtludtATbZ:IbC7kNKUmMedUWK1Gm5oPqvnl1oFtsTg

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks