General

  • Target

    da73e155d2a08c5748a0690f02dc8668_JaffaCakes118

  • Size

    10KB

  • Sample

    240405-v925kaab61

  • MD5

    da73e155d2a08c5748a0690f02dc8668

  • SHA1

    f82dc98cb76a84117da3bd4f0ade1c97b4cb20ed

  • SHA256

    5966f72a329a6d191c7830fb9d00d9883287ecb6aa32fa05af8e9cc9d2eb3915

  • SHA512

    1311d97f9db31bc771b57a4767bbad300b9a4e0de679b4925afe73c5f386f5b45bbe28f2f28633d4f97fde36a4f9aace028e436588c8a08e3c60a00610ded492

  • SSDEEP

    192:ScIMmtPWQjG/b+rcafbOv4RgD25SEzBC4vNqH9Rcm3Bql:SPXlGT+OvUgDEhlqHtB6

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://linkshortner.net/jYb4J

Targets

    • Target

      da73e155d2a08c5748a0690f02dc8668_JaffaCakes118

    • Size

      10KB

    • MD5

      da73e155d2a08c5748a0690f02dc8668

    • SHA1

      f82dc98cb76a84117da3bd4f0ade1c97b4cb20ed

    • SHA256

      5966f72a329a6d191c7830fb9d00d9883287ecb6aa32fa05af8e9cc9d2eb3915

    • SHA512

      1311d97f9db31bc771b57a4767bbad300b9a4e0de679b4925afe73c5f386f5b45bbe28f2f28633d4f97fde36a4f9aace028e436588c8a08e3c60a00610ded492

    • SSDEEP

      192:ScIMmtPWQjG/b+rcafbOv4RgD25SEzBC4vNqH9Rcm3Bql:SPXlGT+OvUgDEhlqHtB6

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks