General

  • Target

    bf3cb26536cefc1b3643320d89631d88_JaffaCakes118

  • Size

    50KB

  • Sample

    240824-x1ezsawhkj

  • MD5

    bf3cb26536cefc1b3643320d89631d88

  • SHA1

    04fe819eee5e3ff66c52c4514263644886c6a59f

  • SHA256

    219913642293596bcea856cb1a9aa969cfed65fbb5ae408c40f479461ba35b60

  • SHA512

    0f2c16ca55c8b278fdecb6123b80f5c527285f5b3744f2322fb7ff10505e4c452b5ff18a18234878e729323756b77c2f6bb07ab0c790b58a4aa69cc823df604f

  • SSDEEP

    1536:hLvB1aPLFh7VMJyrEGPw9ERRpItzsWRoe7Akhlf3c:hLpry/o9ER7ItoWNjlf3c

Malware Config

Targets

    • Target

      bf3cb26536cefc1b3643320d89631d88_JaffaCakes118

    • Size

      50KB

    • MD5

      bf3cb26536cefc1b3643320d89631d88

    • SHA1

      04fe819eee5e3ff66c52c4514263644886c6a59f

    • SHA256

      219913642293596bcea856cb1a9aa969cfed65fbb5ae408c40f479461ba35b60

    • SHA512

      0f2c16ca55c8b278fdecb6123b80f5c527285f5b3744f2322fb7ff10505e4c452b5ff18a18234878e729323756b77c2f6bb07ab0c790b58a4aa69cc823df604f

    • SSDEEP

      1536:hLvB1aPLFh7VMJyrEGPw9ERRpItzsWRoe7Akhlf3c:hLpry/o9ER7ItoWNjlf3c

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks