General

  • Target

    44ad4dd5cc7718abb65110455bc704b0_JaffaCakes118

  • Size

    222KB

  • Sample

    241014-3bce9a1fpg

  • MD5

    44ad4dd5cc7718abb65110455bc704b0

  • SHA1

    411c137a904327a018be385ba6c1fe336bd53bad

  • SHA256

    f9dffc7bf3030ffed55aebd8f2350b014761717b9926621e2e6172336fc52a10

  • SHA512

    01874722d8c15c3eec4f02892eb7645775402661ff19768db0528b89e26a21a4a0afd29d467eba892e62ed47b5b5d45bd912e826aa30a53dad05d0a74e6aaca0

  • SSDEEP

    3072:pbRPgRgrhBYEXbUI4Actv/xlWLfcac9v4DzWTSRPW2FDAnq7RvNv3lFWNJC:A+kEKvrWzFswHIwPWCDMq19VFWLC

Malware Config

Targets

    • Target

      44ad4dd5cc7718abb65110455bc704b0_JaffaCakes118

    • Size

      222KB

    • MD5

      44ad4dd5cc7718abb65110455bc704b0

    • SHA1

      411c137a904327a018be385ba6c1fe336bd53bad

    • SHA256

      f9dffc7bf3030ffed55aebd8f2350b014761717b9926621e2e6172336fc52a10

    • SHA512

      01874722d8c15c3eec4f02892eb7645775402661ff19768db0528b89e26a21a4a0afd29d467eba892e62ed47b5b5d45bd912e826aa30a53dad05d0a74e6aaca0

    • SSDEEP

      3072:pbRPgRgrhBYEXbUI4Actv/xlWLfcac9v4DzWTSRPW2FDAnq7RvNv3lFWNJC:A+kEKvrWzFswHIwPWCDMq19VFWLC

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks