Resubmissions

20-12-2024 21:57

241220-1vd23svrbr 8

18-12-2024 19:52

241218-ylw57azrfn 10

18-12-2024 19:51

241218-ylabeszrek 3

18-12-2024 19:31

241218-x8fw2sypez 8

18-12-2024 19:27

241218-x6k3zsypaw 3

18-12-2024 19:27

241218-x54hyazlfn 3

General

  • Target

    fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118

  • Size

    93KB

  • Sample

    241220-1vd23svrbr

  • MD5

    fcd1cdfe358c3b7c95e10cf72dbf727f

  • SHA1

    7c5c487471db6b1702085fd880a931a819baa264

  • SHA256

    d95ae7b09fc599fa5ef99c04131117f9b8f9432b3b4aa9cf8492535f8d71ceae

  • SHA512

    30ca7a429aa4b1b3a877c6b8b83e3f957c2cb5a7a06d2ad63e0be5e85ade27f0d3255d8c0c671150013c01546369052882f5db77997f3980148a8b7a3a47caa6

  • SSDEEP

    1536:UHedaEV1N3QjlwBgiZDASIKwJJYut9OLod6/d3Vb4fcXwWx+7oRW8pO+W/O:Kedai/3ywBgirIBL1qd3VbrXp+7ow+D

Malware Config

Targets

    • Target

      fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118

    • Size

      93KB

    • MD5

      fcd1cdfe358c3b7c95e10cf72dbf727f

    • SHA1

      7c5c487471db6b1702085fd880a931a819baa264

    • SHA256

      d95ae7b09fc599fa5ef99c04131117f9b8f9432b3b4aa9cf8492535f8d71ceae

    • SHA512

      30ca7a429aa4b1b3a877c6b8b83e3f957c2cb5a7a06d2ad63e0be5e85ade27f0d3255d8c0c671150013c01546369052882f5db77997f3980148a8b7a3a47caa6

    • SSDEEP

      1536:UHedaEV1N3QjlwBgiZDASIKwJJYut9OLod6/d3Vb4fcXwWx+7oRW8pO+W/O:Kedai/3ywBgirIBL1qd3VbrXp+7ow+D

    • Creates new service(s)

    • Downloads MZ/PE file

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Possible privilege escalation attempt

    • A potential corporate email address has been identified in the URL: currency-file@1

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks