General

  • Target

    e115adacf26c881d1e79d6d29fa7ecda_JaffaCakes118

  • Size

    194KB

  • Sample

    240914-1e88aaxenm

  • MD5

    e115adacf26c881d1e79d6d29fa7ecda

  • SHA1

    e60e774a69824dfb194fc43dca1212b78d2415f6

  • SHA256

    d60316dbeaec552799900c0c2e5e74a777870d0dfc4f0e06487b5a03df8a07f4

  • SHA512

    4e4a594a6fc32dcfadd46758aa9edbc11b78b7113d9e71c95aa44e4941f0d8b942b85f71f855ccb6b4197a26f16e6f6200ff3afda16a268542d2e062f8af492b

  • SSDEEP

    6144:YeJIoArEPwnfAWWDx6VpJXmwBKN1UtH+:TiewnzXpJXrq0

Malware Config

Targets

    • Target

      e115adacf26c881d1e79d6d29fa7ecda_JaffaCakes118

    • Size

      194KB

    • MD5

      e115adacf26c881d1e79d6d29fa7ecda

    • SHA1

      e60e774a69824dfb194fc43dca1212b78d2415f6

    • SHA256

      d60316dbeaec552799900c0c2e5e74a777870d0dfc4f0e06487b5a03df8a07f4

    • SHA512

      4e4a594a6fc32dcfadd46758aa9edbc11b78b7113d9e71c95aa44e4941f0d8b942b85f71f855ccb6b4197a26f16e6f6200ff3afda16a268542d2e062f8af492b

    • SSDEEP

      6144:YeJIoArEPwnfAWWDx6VpJXmwBKN1UtH+:TiewnzXpJXrq0

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks