Resubmissions

11-12-2024 23:32

241211-3jjjjaslgx 8

02-12-2024 12:03

241202-n8ffvasqb1 5

24-11-2024 10:24

241124-mfcntavpfs 8

24-11-2024 10:02

241124-l2r5ys1jfn 8

24-11-2024 10:01

241124-l2e6dsvkgv 3

General

  • Target

    93f4a2182702dcb81cc63506ffb8f185_JaffaCakes118

  • Size

    60KB

  • Sample

    241211-3jjjjaslgx

  • MD5

    93f4a2182702dcb81cc63506ffb8f185

  • SHA1

    b6f91299ad563acdb42725f3502a91904d4957f3

  • SHA256

    a3f25cf73d46cecf88b791616b7b15efb57f0d17d61904af655535568288c35e

  • SHA512

    642993e2bff2db269a17d891750902dc3e4df29ccac7d7ccb51f70a7779b2f58d645df8383ed85ffe0ded851896d78aef9da1241679cd3ad0f130fe6e0e0d747

  • SSDEEP

    768:vCru/f9Iw/E6zy4n8uZ5tUXMJ+fROUmELY2glEbM3j+rd+fpRiTWNReOOe:71Tzy48untU8fOMEI3jyYfPiuOe

Malware Config

Targets

    • Target

      93f4a2182702dcb81cc63506ffb8f185_JaffaCakes118

    • Size

      60KB

    • MD5

      93f4a2182702dcb81cc63506ffb8f185

    • SHA1

      b6f91299ad563acdb42725f3502a91904d4957f3

    • SHA256

      a3f25cf73d46cecf88b791616b7b15efb57f0d17d61904af655535568288c35e

    • SHA512

      642993e2bff2db269a17d891750902dc3e4df29ccac7d7ccb51f70a7779b2f58d645df8383ed85ffe0ded851896d78aef9da1241679cd3ad0f130fe6e0e0d747

    • SSDEEP

      768:vCru/f9Iw/E6zy4n8uZ5tUXMJ+fROUmELY2glEbM3j+rd+fpRiTWNReOOe:71Tzy48untU8fOMEI3jyYfPiuOe

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • A potential corporate email address has been identified in the URL: httpsmedium.com@bonguides25howtoinstallnetcatonwindows1011f5be1a185611

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks