General

  • Target

    44af8f7ae310023be4b67336acc2d631_JaffaCakes118

  • Size

    123KB

  • Sample

    241014-3c1t8svhnq

  • MD5

    44af8f7ae310023be4b67336acc2d631

  • SHA1

    9fd05e5d7cb1b677d91f6c5a80612d950b668db4

  • SHA256

    61402f6a0c49622a7fd415a197c21e064d026e05867b5ad150be7c1ec57fe69e

  • SHA512

    5169fc1ec543204f5dad7999e425699c8ba1c9685445284acd945feef49772d2f101af89913dd542ed4b056984ec67e49dae7f919952cffc0f70135b3f933335

  • SSDEEP

    3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLWrr4:OVYrJrOSsRwcpH

Score
8/10

Malware Config

Targets

    • Target

      44af8f7ae310023be4b67336acc2d631_JaffaCakes118

    • Size

      123KB

    • MD5

      44af8f7ae310023be4b67336acc2d631

    • SHA1

      9fd05e5d7cb1b677d91f6c5a80612d950b668db4

    • SHA256

      61402f6a0c49622a7fd415a197c21e064d026e05867b5ad150be7c1ec57fe69e

    • SHA512

      5169fc1ec543204f5dad7999e425699c8ba1c9685445284acd945feef49772d2f101af89913dd542ed4b056984ec67e49dae7f919952cffc0f70135b3f933335

    • SSDEEP

      3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLWrr4:OVYrJrOSsRwcpH

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks