General

  • Target

    e04366791dce250af0660d2c439c6f4d_JaffaCakes118

  • Size

    143KB

  • Sample

    240914-qkhx6swdqh

  • MD5

    e04366791dce250af0660d2c439c6f4d

  • SHA1

    3a7fde192772c5227ccd586b59bb6eb86daa4ba7

  • SHA256

    61df05dd626c13132127e551aa1a74f200cbb4ae624cf38718555b3b334cd792

  • SHA512

    6fce074fae2403508d803e20b99e7ca522364100169cb10c4d585d2eefdc698bbc3e7d65097dadb61917fc5a3afdf3562f640148ccedece15fb7d5491e1dbd1c

  • SSDEEP

    3072:ogMZnhu2dy9GCJrc4thLCD56ouL6rqh17aBtgZWeJ/b9LM9EXDLPL:ophuyCqUCDM17GSZTlMUL

Malware Config

Targets

    • Target

      e04366791dce250af0660d2c439c6f4d_JaffaCakes118

    • Size

      143KB

    • MD5

      e04366791dce250af0660d2c439c6f4d

    • SHA1

      3a7fde192772c5227ccd586b59bb6eb86daa4ba7

    • SHA256

      61df05dd626c13132127e551aa1a74f200cbb4ae624cf38718555b3b334cd792

    • SHA512

      6fce074fae2403508d803e20b99e7ca522364100169cb10c4d585d2eefdc698bbc3e7d65097dadb61917fc5a3afdf3562f640148ccedece15fb7d5491e1dbd1c

    • SSDEEP

      3072:ogMZnhu2dy9GCJrc4thLCD56ouL6rqh17aBtgZWeJ/b9LM9EXDLPL:ophuyCqUCDM17GSZTlMUL

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks