General

  • Target

    d10ec66fec8d453bf455332046e1150e_JaffaCakes118

  • Size

    91KB

  • Sample

    240907-ewqxdavapp

  • MD5

    d10ec66fec8d453bf455332046e1150e

  • SHA1

    8c6e5ee4736868fa62b7140090c87d3e76b58bf4

  • SHA256

    82e033f798c3fbed372a78ebc6c7f74bedcc2ac5167d2db12cf3a7e914d292e3

  • SHA512

    3454c1bcfc8b693ddee7f6db505fca415984c8363213d8facf2d264c025126635d393e0a5131beac228abf629a157350a6f3c43be82263c562d533c02e30136a

  • SSDEEP

    1536:RU+d/hvcLNUNWIKCzWmSPNBgdfe9vElOxlwJOkbszzzPXdMWEdsT/ynouy8F4:Rt/hRZKCFSwiTxluOoszXPXmFoutF4

Malware Config

Targets

    • Target

      d10ec66fec8d453bf455332046e1150e_JaffaCakes118

    • Size

      91KB

    • MD5

      d10ec66fec8d453bf455332046e1150e

    • SHA1

      8c6e5ee4736868fa62b7140090c87d3e76b58bf4

    • SHA256

      82e033f798c3fbed372a78ebc6c7f74bedcc2ac5167d2db12cf3a7e914d292e3

    • SHA512

      3454c1bcfc8b693ddee7f6db505fca415984c8363213d8facf2d264c025126635d393e0a5131beac228abf629a157350a6f3c43be82263c562d533c02e30136a

    • SSDEEP

      1536:RU+d/hvcLNUNWIKCzWmSPNBgdfe9vElOxlwJOkbszzzPXdMWEdsT/ynouy8F4:Rt/hRZKCFSwiTxluOoszXPXmFoutF4

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks