General

  • Target

    bbecc3c9c97901f4f9be2984a1274d18_JaffaCakes118

  • Size

    14KB

  • Sample

    240823-qrav5sygqn

  • MD5

    bbecc3c9c97901f4f9be2984a1274d18

  • SHA1

    8f86727fa3b6cc7194dd757caa5b3b012c915dda

  • SHA256

    e1798eb7d825560c18100a1d75e6903e34d54f0b995085684241dc835b13364d

  • SHA512

    4d3cf157be7dfda336d6e9fafe6ef3dcc90cacae96abcd9656136801d75ab4affc4e6d8e33654eb275bd1184851abee62e6fb8b997688aebbec9c8dc6458f55f

  • SSDEEP

    384:5onK/sS4BMER9HEyCIQ/D9YiplKdSfGxLU:5oK0S4FBEyCxPpHfy

Malware Config

Targets

    • Target

      bbecc3c9c97901f4f9be2984a1274d18_JaffaCakes118

    • Size

      14KB

    • MD5

      bbecc3c9c97901f4f9be2984a1274d18

    • SHA1

      8f86727fa3b6cc7194dd757caa5b3b012c915dda

    • SHA256

      e1798eb7d825560c18100a1d75e6903e34d54f0b995085684241dc835b13364d

    • SHA512

      4d3cf157be7dfda336d6e9fafe6ef3dcc90cacae96abcd9656136801d75ab4affc4e6d8e33654eb275bd1184851abee62e6fb8b997688aebbec9c8dc6458f55f

    • SSDEEP

      384:5onK/sS4BMER9HEyCIQ/D9YiplKdSfGxLU:5oK0S4FBEyCxPpHfy

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks