General

  • Target

    b8b381aad6e15c2ba8f25bae6dc16675_JaffaCakes118

  • Size

    192KB

  • Sample

    240822-xaew4a1hlh

  • MD5

    b8b381aad6e15c2ba8f25bae6dc16675

  • SHA1

    34a079eaec0ac5f5f50c505d3d7aac3643beb85f

  • SHA256

    61d783b52ca57b712028985070c28a946dddc2db6ee73627e1770f5ea7823353

  • SHA512

    d463cca534431fcfafaa07339397b27b1fd75655957ea50a432b6c81707fc4a5b63d94bd46c410031ec88e0157fce000fde1d38408ec1058e8400b6c1ec855f1

  • SSDEEP

    3072:1h4UiBqKBCsCD0U4McHQE5B6xBndj1xk0ZNHLj5t6VdtPKZQu7mze7UIHmER:1wNuIUbcHwDdj3br0S2B/fs

Malware Config

Targets

    • Target

      b8b381aad6e15c2ba8f25bae6dc16675_JaffaCakes118

    • Size

      192KB

    • MD5

      b8b381aad6e15c2ba8f25bae6dc16675

    • SHA1

      34a079eaec0ac5f5f50c505d3d7aac3643beb85f

    • SHA256

      61d783b52ca57b712028985070c28a946dddc2db6ee73627e1770f5ea7823353

    • SHA512

      d463cca534431fcfafaa07339397b27b1fd75655957ea50a432b6c81707fc4a5b63d94bd46c410031ec88e0157fce000fde1d38408ec1058e8400b6c1ec855f1

    • SSDEEP

      3072:1h4UiBqKBCsCD0U4McHQE5B6xBndj1xk0ZNHLj5t6VdtPKZQu7mze7UIHmER:1wNuIUbcHwDdj3br0S2B/fs

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks