General

  • Target

    0bfcdea1c327fe3bd45acf389f32110f_JaffaCakes118

  • Size

    10KB

  • Sample

    240328-v91lqsca9v

  • MD5

    0bfcdea1c327fe3bd45acf389f32110f

  • SHA1

    85394a5c68ad8ed1c0abda18411d28938af12ab6

  • SHA256

    50d4fe108644485286a9bd25677d766c48a9089f9e75a994c392153584944dc3

  • SHA512

    6c14cc593a9172cab780c98f99318644255592cef7537b7e0d3610c798e3e181e2fc469727378e3f2902b743172fa49dae60e339a8563b14f3aea89d0bdf239b

  • SSDEEP

    192:ScIMmtPp8G/btCX0iSOi98KamWBXfc3z8CR:SPXxrtCEiSOURo0x

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://urlchill.com/WYLp4

Targets

    • Target

      0bfcdea1c327fe3bd45acf389f32110f_JaffaCakes118

    • Size

      10KB

    • MD5

      0bfcdea1c327fe3bd45acf389f32110f

    • SHA1

      85394a5c68ad8ed1c0abda18411d28938af12ab6

    • SHA256

      50d4fe108644485286a9bd25677d766c48a9089f9e75a994c392153584944dc3

    • SHA512

      6c14cc593a9172cab780c98f99318644255592cef7537b7e0d3610c798e3e181e2fc469727378e3f2902b743172fa49dae60e339a8563b14f3aea89d0bdf239b

    • SSDEEP

      192:ScIMmtPp8G/btCX0iSOi98KamWBXfc3z8CR:SPXxrtCEiSOURo0x

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks