General

  • Target

    003b0a8f2edbe6dfa93030eea368511f_JaffaCakes118

  • Size

    199KB

  • Sample

    240426-hqlbgsbc52

  • MD5

    003b0a8f2edbe6dfa93030eea368511f

  • SHA1

    3dde289f8ca386f0b3f964872b77b71147ddfd4a

  • SHA256

    aebb79d00a5e16152918873b637b5c9a059d85715ebaadaea301faf34273ce01

  • SHA512

    be6bdd78fb9447621ff9a002a3a6c9273601a2b2153935280de5fdd5e1f832958451067b483f69b112f03a79a8f925c48aca821da55fcc5fa2e41e88ed98807c

  • SSDEEP

    1536:PGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilpfsdKY7xST/Ephkop8cEpTWj1P:xrfrzOH98ipgAEDvxBYFu

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://houtai.xiaopbk.com/install/t0H/

exe.dropper

https://gudangalami.com/ivo6rp/UaBj2/

exe.dropper

https://webhostingsrilanka.info/pkrgs/ODn/

exe.dropper

http://luzzeri.com/wp-includes/T1mrkC/

exe.dropper

http://mobithem.com/blogs/Z3/

exe.dropper

http://planosdesaudesemcarencia.com/erros/E8iv/

exe.dropper

http://lookuppopup.co.uk/content/uploads/XNEm9/

Targets

    • Target

      003b0a8f2edbe6dfa93030eea368511f_JaffaCakes118

    • Size

      199KB

    • MD5

      003b0a8f2edbe6dfa93030eea368511f

    • SHA1

      3dde289f8ca386f0b3f964872b77b71147ddfd4a

    • SHA256

      aebb79d00a5e16152918873b637b5c9a059d85715ebaadaea301faf34273ce01

    • SHA512

      be6bdd78fb9447621ff9a002a3a6c9273601a2b2153935280de5fdd5e1f832958451067b483f69b112f03a79a8f925c48aca821da55fcc5fa2e41e88ed98807c

    • SSDEEP

      1536:PGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilpfsdKY7xST/Ephkop8cEpTWj1P:xrfrzOH98ipgAEDvxBYFu

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks