General

  • Target

    372a7486309403cbfaa780d4b6d5c474_JaffaCakes118

  • Size

    200KB

  • Sample

    241011-2lgx2ssenj

  • MD5

    372a7486309403cbfaa780d4b6d5c474

  • SHA1

    9b1e66060282bbd0a0c4532c71743882baea72a3

  • SHA256

    9a90ed09d8eb739498a3383050cb0a6dbbc5b3fe6aad25d9f612caffa40430e3

  • SHA512

    5dd5c9107c6e1f9a53bbcbde426dce278bf8c55a02b1cb470895e2ebe903ea6385d935487c44a181e6ba7dc233a5a307c7ca22892df94c7d709a392c36d1543e

  • SSDEEP

    6144:laPqzXb8tLmcIovURXtWd+9t7VnOePu9:laCzXotFIs9YX7V

Malware Config

Targets

    • Target

      372a7486309403cbfaa780d4b6d5c474_JaffaCakes118

    • Size

      200KB

    • MD5

      372a7486309403cbfaa780d4b6d5c474

    • SHA1

      9b1e66060282bbd0a0c4532c71743882baea72a3

    • SHA256

      9a90ed09d8eb739498a3383050cb0a6dbbc5b3fe6aad25d9f612caffa40430e3

    • SHA512

      5dd5c9107c6e1f9a53bbcbde426dce278bf8c55a02b1cb470895e2ebe903ea6385d935487c44a181e6ba7dc233a5a307c7ca22892df94c7d709a392c36d1543e

    • SSDEEP

      6144:laPqzXb8tLmcIovURXtWd+9t7VnOePu9:laCzXotFIs9YX7V

    • Modifies firewall policy service

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks