General

  • Target

    aa0e24f39ddf539241205ba422a113da_JaffaCakes118

  • Size

    14KB

  • Sample

    240819-hw267atekn

  • MD5

    aa0e24f39ddf539241205ba422a113da

  • SHA1

    c733d5e7f2d2bc4ca4b0fcb790c521f07518fd31

  • SHA256

    7967a0c3fdeaa6884db43f14ac974f0a94e976e85aab92729ead93d4955f156d

  • SHA512

    6d6ed0c9ec3e7c1d07244a475d24d9cf152cc8c7cfed527280bc94e10c7e6c346b3f000c2b51322e77c744ea6e6b35871b9242c9e43e7ee9fb387d0e2df1c740

  • SSDEEP

    384:Q7/EgdDWpfpRAwbfRDQWF3sZnOSHePUmAy7S:QAgdqJAqRDQWF3sZOdJV

Malware Config

Targets

    • Target

      aa0e24f39ddf539241205ba422a113da_JaffaCakes118

    • Size

      14KB

    • MD5

      aa0e24f39ddf539241205ba422a113da

    • SHA1

      c733d5e7f2d2bc4ca4b0fcb790c521f07518fd31

    • SHA256

      7967a0c3fdeaa6884db43f14ac974f0a94e976e85aab92729ead93d4955f156d

    • SHA512

      6d6ed0c9ec3e7c1d07244a475d24d9cf152cc8c7cfed527280bc94e10c7e6c346b3f000c2b51322e77c744ea6e6b35871b9242c9e43e7ee9fb387d0e2df1c740

    • SSDEEP

      384:Q7/EgdDWpfpRAwbfRDQWF3sZnOSHePUmAy7S:QAgdqJAqRDQWF3sZOdJV

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks