General

  • Target

    bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118

  • Size

    167KB

  • Sample

    240823-w322na1gpk

  • MD5

    bcb41b5c44ae429a861d41c953abda8d

  • SHA1

    0e81e9208f3a1062da733cd68ed56a4241868fc7

  • SHA256

    3efb61211a9fdfc34a6951337bb9cc735914e2d80f81d0f768e09d646a7bccc0

  • SHA512

    f202e2f813ef902d5a7a5e1d9d86bb6f3a613ff1b343114caa5e1a22bf388b1c01d7dc15e27e12f13105e14608f3027e53972d3f4d467de9e5ad20416b075778

  • SSDEEP

    3072:0l856uXS5CH6BDsmXYm+uJJTd4ISvyRbGLoQM71a1DzSLTjMrpKYqonqm:NSDbH7Td4zaRqLhM71rL/MtfqoT

Score
7/10

Malware Config

Targets

    • Target

      bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118

    • Size

      167KB

    • MD5

      bcb41b5c44ae429a861d41c953abda8d

    • SHA1

      0e81e9208f3a1062da733cd68ed56a4241868fc7

    • SHA256

      3efb61211a9fdfc34a6951337bb9cc735914e2d80f81d0f768e09d646a7bccc0

    • SHA512

      f202e2f813ef902d5a7a5e1d9d86bb6f3a613ff1b343114caa5e1a22bf388b1c01d7dc15e27e12f13105e14608f3027e53972d3f4d467de9e5ad20416b075778

    • SSDEEP

      3072:0l856uXS5CH6BDsmXYm+uJJTd4ISvyRbGLoQM71a1DzSLTjMrpKYqonqm:NSDbH7Td4zaRqLhM71rL/MtfqoT

    Score
    7/10
    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks