General

  • Target

    a9b4b9ff17593fd87083c13f7701fdbf_JaffaCakes118

  • Size

    35KB

  • Sample

    240819-fsj54ayhrk

  • MD5

    a9b4b9ff17593fd87083c13f7701fdbf

  • SHA1

    75a1c690ddb6297fa34fd2e1c9e14691f45b140d

  • SHA256

    09e58cfd09e6a33e7e2cfc07464dc792ee12069fb6c63756c9f7e9f26e5d0118

  • SHA512

    49a74ba5ce1085cc5d001840188df0d95fd3b66b11f339b5970063c3ae7862451efcd4f14f447a20dd9632f95777053c4ddce4bd1c6aae5f333a207ccad523fa

  • SSDEEP

    768:y0wEd+cgWbfo69AvY+4V/6qN2V3E+zQFE:y0tdRgWzh+vYVV/5N2ZXF

Malware Config

Targets

    • Target

      a9b4b9ff17593fd87083c13f7701fdbf_JaffaCakes118

    • Size

      35KB

    • MD5

      a9b4b9ff17593fd87083c13f7701fdbf

    • SHA1

      75a1c690ddb6297fa34fd2e1c9e14691f45b140d

    • SHA256

      09e58cfd09e6a33e7e2cfc07464dc792ee12069fb6c63756c9f7e9f26e5d0118

    • SHA512

      49a74ba5ce1085cc5d001840188df0d95fd3b66b11f339b5970063c3ae7862451efcd4f14f447a20dd9632f95777053c4ddce4bd1c6aae5f333a207ccad523fa

    • SSDEEP

      768:y0wEd+cgWbfo69AvY+4V/6qN2V3E+zQFE:y0tdRgWzh+vYVV/5N2ZXF

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks