General

  • Target

    dd667a64cd7694b410e9a5a1d4a6fdb1_JaffaCakes118

  • Size

    13KB

  • Sample

    240913-brj2gswfjl

  • MD5

    dd667a64cd7694b410e9a5a1d4a6fdb1

  • SHA1

    1a3e102adbf979927caa1c5a5cb3a3bc617e450b

  • SHA256

    646bf1a02ad3b8e2b99ae060afd8f1df079f09a6cf0fcae287fae18d88085b05

  • SHA512

    73f0ecd2ebcb5ca3991cea662be83a107174fccc5c883b3d1c6007ae93418c649714bc87aa2fae47b7c2752ee0e3f2268ef31d12959f46f72ac344410f7e4129

  • SSDEEP

    384:IhWw8KGaw0dvcZTGdAb09nYV/wgWI0l4+:IhWwR5w0dElG2ba1gWD

Malware Config

Targets

    • Target

      dd667a64cd7694b410e9a5a1d4a6fdb1_JaffaCakes118

    • Size

      13KB

    • MD5

      dd667a64cd7694b410e9a5a1d4a6fdb1

    • SHA1

      1a3e102adbf979927caa1c5a5cb3a3bc617e450b

    • SHA256

      646bf1a02ad3b8e2b99ae060afd8f1df079f09a6cf0fcae287fae18d88085b05

    • SHA512

      73f0ecd2ebcb5ca3991cea662be83a107174fccc5c883b3d1c6007ae93418c649714bc87aa2fae47b7c2752ee0e3f2268ef31d12959f46f72ac344410f7e4129

    • SSDEEP

      384:IhWw8KGaw0dvcZTGdAb09nYV/wgWI0l4+:IhWwR5w0dElG2ba1gWD

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks