General
-
Target
JaffaCakes118_34c1b41e19977bea70e481344bb22997847eea00e35c04f36ed4a81f8556a8db
-
Size
2.7MB
-
Sample
241221-xghxbswncv
-
MD5
5a0d2e3b52fe4cf7d627c098d86f1557
-
SHA1
011aade7c013edc076e0b8c75d07c6362b797a43
-
SHA256
34c1b41e19977bea70e481344bb22997847eea00e35c04f36ed4a81f8556a8db
-
SHA512
8f689adbc41821071eba45009d6ffdb7853bd8b55ce41a3716fc020ba95a75173b7bb88399cc894751108e180ae9eccf70c5a9e5c0eab85923192a871f6f7489
-
SSDEEP
24576:PufOgVAsEaXNN693SGipBEYg5t4ATR9giW5YEk4tpJwBBmvRROTU8fvSTXZv:sb
Behavioral task
behavioral1
Sample
JaffaCakes118_34c1b41e19977bea70e481344bb22997847eea00e35c04f36ed4a81f8556a8db.xls
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_34c1b41e19977bea70e481344bb22997847eea00e35c04f36ed4a81f8556a8db
-
Size
2.7MB
-
MD5
5a0d2e3b52fe4cf7d627c098d86f1557
-
SHA1
011aade7c013edc076e0b8c75d07c6362b797a43
-
SHA256
34c1b41e19977bea70e481344bb22997847eea00e35c04f36ed4a81f8556a8db
-
SHA512
8f689adbc41821071eba45009d6ffdb7853bd8b55ce41a3716fc020ba95a75173b7bb88399cc894751108e180ae9eccf70c5a9e5c0eab85923192a871f6f7489
-
SSDEEP
24576:PufOgVAsEaXNN693SGipBEYg5t4ATR9giW5YEk4tpJwBBmvRROTU8fvSTXZv:sb
-
Mimikatz family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
mimikatz is an open source tool to dump credentials on Windows
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1