Resubmissions

11-12-2024 23:32

241211-3jjjjaslgx 8

02-12-2024 12:03

241202-n8ffvasqb1 5

24-11-2024 10:24

241124-mfcntavpfs 8

24-11-2024 10:02

241124-l2r5ys1jfn 8

24-11-2024 10:01

241124-l2e6dsvkgv 3

General

  • Target

    93f4a2182702dcb81cc63506ffb8f185_JaffaCakes118

  • Size

    60KB

  • Sample

    241124-mfcntavpfs

  • MD5

    93f4a2182702dcb81cc63506ffb8f185

  • SHA1

    b6f91299ad563acdb42725f3502a91904d4957f3

  • SHA256

    a3f25cf73d46cecf88b791616b7b15efb57f0d17d61904af655535568288c35e

  • SHA512

    642993e2bff2db269a17d891750902dc3e4df29ccac7d7ccb51f70a7779b2f58d645df8383ed85ffe0ded851896d78aef9da1241679cd3ad0f130fe6e0e0d747

  • SSDEEP

    768:vCru/f9Iw/E6zy4n8uZ5tUXMJ+fROUmELY2glEbM3j+rd+fpRiTWNReOOe:71Tzy48untU8fOMEI3jyYfPiuOe

Malware Config

Targets

    • Target

      93f4a2182702dcb81cc63506ffb8f185_JaffaCakes118

    • Size

      60KB

    • MD5

      93f4a2182702dcb81cc63506ffb8f185

    • SHA1

      b6f91299ad563acdb42725f3502a91904d4957f3

    • SHA256

      a3f25cf73d46cecf88b791616b7b15efb57f0d17d61904af655535568288c35e

    • SHA512

      642993e2bff2db269a17d891750902dc3e4df29ccac7d7ccb51f70a7779b2f58d645df8383ed85ffe0ded851896d78aef9da1241679cd3ad0f130fe6e0e0d747

    • SSDEEP

      768:vCru/f9Iw/E6zy4n8uZ5tUXMJ+fROUmELY2glEbM3j+rd+fpRiTWNReOOe:71Tzy48untU8fOMEI3jyYfPiuOe

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: =@L

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks