General

  • Target

    9ef875632fcaa479f523de43fa0c07d4_JaffaCakes118

  • Size

    7KB

  • Sample

    240403-d3bwcsfa99

  • MD5

    9ef875632fcaa479f523de43fa0c07d4

  • SHA1

    601df45a5ca6e6baad74ee81c02fb865b300f89e

  • SHA256

    4e49a4e5968f47f2244c8202b06f1de53f7fbb33c65ca93e0714dac51ab5bd93

  • SHA512

    dbd80961bb97ba82aa2c647354814fed7b682ca505b67fa2410e2cc2cfa1531cba8bacbb7bff4c87f7eec6d206b227456fb340c873c6ab345184ac68ef06512a

  • SSDEEP

    192:D4SAKqhxj/sZS2Fnj/JJxDxyNXdw62uEqWhOffuCUK3hXt:DWF7/sHnj/JfgXhQcI4hXt

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://goo-gl.ru.com/sV0

Targets

    • Target

      9ef875632fcaa479f523de43fa0c07d4_JaffaCakes118

    • Size

      7KB

    • MD5

      9ef875632fcaa479f523de43fa0c07d4

    • SHA1

      601df45a5ca6e6baad74ee81c02fb865b300f89e

    • SHA256

      4e49a4e5968f47f2244c8202b06f1de53f7fbb33c65ca93e0714dac51ab5bd93

    • SHA512

      dbd80961bb97ba82aa2c647354814fed7b682ca505b67fa2410e2cc2cfa1531cba8bacbb7bff4c87f7eec6d206b227456fb340c873c6ab345184ac68ef06512a

    • SSDEEP

      192:D4SAKqhxj/sZS2Fnj/JJxDxyNXdw62uEqWhOffuCUK3hXt:DWF7/sHnj/JfgXhQcI4hXt

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks