General

  • Target

    0095158b8a5a8d89dcee97dbaf6fd073_JaffaCakes118

  • Size

    156KB

  • Sample

    240426-mrhzzaef67

  • MD5

    0095158b8a5a8d89dcee97dbaf6fd073

  • SHA1

    d8742ecbb3c14c8443e3e9d646531333103cd8e4

  • SHA256

    050b38c2cf415a2d1bd35c50f3feddf8f15a5279fcefb35883766da169c87c01

  • SHA512

    bc3ac0f0da0412d7ff1d8d6cc9e530accd1e118e68829ec922ee49b192294366b2d2ab106ea238c4cdc7b71bed2def10aa8db946dffd712b08056136f696a830

  • SSDEEP

    1536:CINj/tINj/ardi1Ir77zOH98Wj2gpngB+a9/pNvuaRlYYP46/3k/W+k/iSvgR0wS:VrfrzOH98ipgrNQYP4zua0wS

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://asfckmusic.com/axhhy/2/

exe.dropper

http://webtalavera.com/site/1nBdLgY/

exe.dropper

http://varthana.com/archive/sEaku/

exe.dropper

http://rjsoft.nl/helpdesk/8TQ54h/

exe.dropper

http://zoomandshootphotography.com/wp-includes/MPkwrU2/

exe.dropper

http://prodel.com.br/pedidos/Sp9/

exe.dropper

http://iemsys.co.za/fsffa.co.za/2ntFq/

Targets

    • Target

      0095158b8a5a8d89dcee97dbaf6fd073_JaffaCakes118

    • Size

      156KB

    • MD5

      0095158b8a5a8d89dcee97dbaf6fd073

    • SHA1

      d8742ecbb3c14c8443e3e9d646531333103cd8e4

    • SHA256

      050b38c2cf415a2d1bd35c50f3feddf8f15a5279fcefb35883766da169c87c01

    • SHA512

      bc3ac0f0da0412d7ff1d8d6cc9e530accd1e118e68829ec922ee49b192294366b2d2ab106ea238c4cdc7b71bed2def10aa8db946dffd712b08056136f696a830

    • SSDEEP

      1536:CINj/tINj/ardi1Ir77zOH98Wj2gpngB+a9/pNvuaRlYYP46/3k/W+k/iSvgR0wS:VrfrzOH98ipgrNQYP4zua0wS

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks