General

  • Target

    ffd5276b620edc1110b4d2be2af86434_JaffaCakes118

  • Size

    134KB

  • Sample

    240421-wf1kbagc93

  • MD5

    ffd5276b620edc1110b4d2be2af86434

  • SHA1

    0340b89b5b78bbe0ea53c5a6ac6110737dc00249

  • SHA256

    f15d81061f758dbcd06aeff487b4c184c1fa60fe747dc25eda9a0481170d3ed2

  • SHA512

    d1d22009fb704b1e876b7f3f39ec386005c8e904713cbe74fea84179c8f965ffa1dc902469f3eb6781c58c87d613986b2964af037c11ad7408ce8d0f216c60f4

  • SSDEEP

    3072:ok3hOdsylKlgxopeiBNhZFGzE+cL2kdAwc6YehWfGotUHKGDbpmsiioati+0LsC:ok3hOdsylKlgxopeiBNhZF+E+W2kdAwK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://190.14.37.220/45403.7448934028.dat

xlm40.dropper

http://23.106.125.233/45403.7448934028.dat

xlm40.dropper

http://178.23.190.199/45403.7448934028.dat

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://190.14.37.220/45403.744912963.dat

xlm40.dropper

http://23.106.125.233/45403.744912963.dat

xlm40.dropper

http://178.23.190.199/45403.744912963.dat

Targets

    • Target

      ffd5276b620edc1110b4d2be2af86434_JaffaCakes118

    • Size

      134KB

    • MD5

      ffd5276b620edc1110b4d2be2af86434

    • SHA1

      0340b89b5b78bbe0ea53c5a6ac6110737dc00249

    • SHA256

      f15d81061f758dbcd06aeff487b4c184c1fa60fe747dc25eda9a0481170d3ed2

    • SHA512

      d1d22009fb704b1e876b7f3f39ec386005c8e904713cbe74fea84179c8f965ffa1dc902469f3eb6781c58c87d613986b2964af037c11ad7408ce8d0f216c60f4

    • SSDEEP

      3072:ok3hOdsylKlgxopeiBNhZFGzE+cL2kdAwc6YehWfGotUHKGDbpmsiioati+0LsC:ok3hOdsylKlgxopeiBNhZF+E+W2kdAwK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks