General

  • Target

    d55030741d7d4e5ab4d10ea6a92ab3dc_JaffaCakes118

  • Size

    208KB

  • Sample

    240908-3tbxfa1fml

  • MD5

    d55030741d7d4e5ab4d10ea6a92ab3dc

  • SHA1

    e04dd824d1dee0270d681a692f7253c106b4089d

  • SHA256

    400c3c197bb2fdf11175443d341b4b698dbee576272b0afc6b06d1bccfbc24b3

  • SHA512

    59e40c4a50c1003fb24bbe23d3f18b237f5db94da412f349cb852b7939cc164001e8fda4f8f26e2c82757b507183ab1acab57f8faa8b5e6e95cb2ba1d2d6e81f

  • SSDEEP

    3072:xIdcFLEdskgrt05bnwhVh6PTPKp6zQc9bav/DIIjOdbryuyRCpGGuj7N+d:6WjZ0xCVh6Qch+ORrcBj7N2

Malware Config

Targets

    • Target

      d55030741d7d4e5ab4d10ea6a92ab3dc_JaffaCakes118

    • Size

      208KB

    • MD5

      d55030741d7d4e5ab4d10ea6a92ab3dc

    • SHA1

      e04dd824d1dee0270d681a692f7253c106b4089d

    • SHA256

      400c3c197bb2fdf11175443d341b4b698dbee576272b0afc6b06d1bccfbc24b3

    • SHA512

      59e40c4a50c1003fb24bbe23d3f18b237f5db94da412f349cb852b7939cc164001e8fda4f8f26e2c82757b507183ab1acab57f8faa8b5e6e95cb2ba1d2d6e81f

    • SSDEEP

      3072:xIdcFLEdskgrt05bnwhVh6PTPKp6zQc9bav/DIIjOdbryuyRCpGGuj7N+d:6WjZ0xCVh6Qch+ORrcBj7N2

    • UAC bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks