General

  • Target

    433cdbbb45b4d83cc209fb567d3403db_JaffaCakes118

  • Size

    123KB

  • Sample

    241014-vjgqyazcrj

  • MD5

    433cdbbb45b4d83cc209fb567d3403db

  • SHA1

    76a289bfbbc60ebcc6a8354e18ba7602237780b5

  • SHA256

    302f1ce4bec8c6fd15e311255263f8ed51d8662da078692f7430097259e76257

  • SHA512

    f9e005e345bea70eeaa3ae34efc2dea7be6d0bfcb34102c2c839469a676f48adc00064ea80e2066ae92cb3b043bad068c30a49e4811728f46c7bc0c720f799ff

  • SSDEEP

    3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLcXGLG:OVYrJrOSsRwcpKXH

Score
8/10

Malware Config

Targets

    • Target

      433cdbbb45b4d83cc209fb567d3403db_JaffaCakes118

    • Size

      123KB

    • MD5

      433cdbbb45b4d83cc209fb567d3403db

    • SHA1

      76a289bfbbc60ebcc6a8354e18ba7602237780b5

    • SHA256

      302f1ce4bec8c6fd15e311255263f8ed51d8662da078692f7430097259e76257

    • SHA512

      f9e005e345bea70eeaa3ae34efc2dea7be6d0bfcb34102c2c839469a676f48adc00064ea80e2066ae92cb3b043bad068c30a49e4811728f46c7bc0c720f799ff

    • SSDEEP

      3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLcXGLG:OVYrJrOSsRwcpKXH

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks