General

  • Target

    f5d1afb30133f308413957b1c0b7e48a_JaffaCakes118

  • Size

    10KB

  • Sample

    240417-p62rqsgb83

  • MD5

    f5d1afb30133f308413957b1c0b7e48a

  • SHA1

    35e8ba8969a01238d82a762d2dc362c9707bc4aa

  • SHA256

    68057aad7234a38719b4f5a888ccd0e6c389026362350c5413555e939d9740ac

  • SHA512

    facf67c0f0309a33e29aa8759e5460eea5b0a9cd755adbd2b546be24e399960752362ae11d9411b479871e086a166afda8f454248f980b0913923587d4061835

  • SSDEEP

    192:ScIMmtPWQjG/b+rcafbOFBF25SEzBC4vNqH9Rcm3hLZ:SPXlGT+OFBFEhlqHthF

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://103.167.84.138/receipt/invc_0000560001.wbk

Targets

    • Target

      f5d1afb30133f308413957b1c0b7e48a_JaffaCakes118

    • Size

      10KB

    • MD5

      f5d1afb30133f308413957b1c0b7e48a

    • SHA1

      35e8ba8969a01238d82a762d2dc362c9707bc4aa

    • SHA256

      68057aad7234a38719b4f5a888ccd0e6c389026362350c5413555e939d9740ac

    • SHA512

      facf67c0f0309a33e29aa8759e5460eea5b0a9cd755adbd2b546be24e399960752362ae11d9411b479871e086a166afda8f454248f980b0913923587d4061835

    • SSDEEP

      192:ScIMmtPWQjG/b+rcafbOFBF25SEzBC4vNqH9Rcm3hLZ:SPXlGT+OFBFEhlqHthF

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks