General

  • Target

    143cbc44b05764a4ee0799f8ce13651c_JaffaCakes118

  • Size

    160KB

  • Sample

    241004-vswapazhla

  • MD5

    143cbc44b05764a4ee0799f8ce13651c

  • SHA1

    42a6731d6da5de3d18c0861246e653e6befa47f4

  • SHA256

    d7a1c6d8507d1a675243475ddadb5bd4257807ea0674c32626cc44e8a4e191a8

  • SHA512

    33e0a08969b36cd80aba4129254aba3f9843a8c599cd082aabdbd7dc44b43db61d467450e159baa5755b8dd002c875bf85919074b8fd232679fd123477c82d12

  • SSDEEP

    3072:NXFgyDjBue6RsY5EkE/cQlUd645g+WljmwaJd:3PB3Y5o/cQaI4C+WljVaJ

Score
10/10

Malware Config

Targets

    • Target

      143cbc44b05764a4ee0799f8ce13651c_JaffaCakes118

    • Size

      160KB

    • MD5

      143cbc44b05764a4ee0799f8ce13651c

    • SHA1

      42a6731d6da5de3d18c0861246e653e6befa47f4

    • SHA256

      d7a1c6d8507d1a675243475ddadb5bd4257807ea0674c32626cc44e8a4e191a8

    • SHA512

      33e0a08969b36cd80aba4129254aba3f9843a8c599cd082aabdbd7dc44b43db61d467450e159baa5755b8dd002c875bf85919074b8fd232679fd123477c82d12

    • SSDEEP

      3072:NXFgyDjBue6RsY5EkE/cQlUd645g+WljmwaJd:3PB3Y5o/cQaI4C+WljVaJ

    Score
    10/10
    • Modifies WinLogon for persistence

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks