General

  • Target

    00539bd67c6d76554cf98b8a0534b29a_JaffaCakes118

  • Size

    90KB

  • Sample

    240426-jvy9kscc49

  • MD5

    00539bd67c6d76554cf98b8a0534b29a

  • SHA1

    ea36a86e04efbcb8d7097b6cb7db6d849ea6c194

  • SHA256

    a07d61afa7f207280178d99e18dd80999cb15636b4815d1115379ed57739ff30

  • SHA512

    6fada542f3228ca31d7824cbc63d140d327db52671f51a781ab8a2923bb52c6a6191f3da60750cd964d1ae513f2dac1662690979e9eecead3ce185c1ff8f83e5

  • SSDEEP

    1536:fptJlmrJpmxlRw99NBd+aBd1dfaJKI+j:xte2dw99fpja0I+j

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://djtosh.co.za/rrp

exe.dropper

http://virginie.exstyle.fr/a

exe.dropper

http://projettv.baudtanette.fr/FZ00c23Z

exe.dropper

http://mujerproductivaradio.jacquelinezorrilla.com/O

exe.dropper

http://esinvestmentinc.ezitsolutions.net/UIf

Targets

    • Target

      00539bd67c6d76554cf98b8a0534b29a_JaffaCakes118

    • Size

      90KB

    • MD5

      00539bd67c6d76554cf98b8a0534b29a

    • SHA1

      ea36a86e04efbcb8d7097b6cb7db6d849ea6c194

    • SHA256

      a07d61afa7f207280178d99e18dd80999cb15636b4815d1115379ed57739ff30

    • SHA512

      6fada542f3228ca31d7824cbc63d140d327db52671f51a781ab8a2923bb52c6a6191f3da60750cd964d1ae513f2dac1662690979e9eecead3ce185c1ff8f83e5

    • SSDEEP

      1536:fptJlmrJpmxlRw99NBd+aBd1dfaJKI+j:xte2dw99fpja0I+j

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks