General

  • Target

    00cfe4c12602c2d1250c999e3b4172d6_JaffaCakes118

  • Size

    223KB

  • Sample

    240426-p4qaxscb34

  • MD5

    00cfe4c12602c2d1250c999e3b4172d6

  • SHA1

    d7e3f205f18794d85a182714be06cfdc3ec84a0a

  • SHA256

    81ab49b690e1bbdc91e690b222a2c7d3bb5edacc027d2db853fc4bff6e68fc2e

  • SHA512

    65b8fdaf2d0cfb0d814b808bd610af37ec5de2c0109922b5eea68d9402434040f789c5155f21e471e1c09c7dda41c439fe9c4722e99ca3e15f753019fa7c8b34

  • SSDEEP

    3072:lV4PrXcuQuvpzm4bkiaMQgAlSGF62ezg24i:cDRv1m4bnQgISGF6Lg24i

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://wynn838.com/wp-content/B/

exe.dropper

https://menuazores.com/root/4eq/

exe.dropper

https://www.lunalysis.com/images/P/

exe.dropper

https://fedo.xyz/wp-admin/AaD/

exe.dropper

http://themsc.net/cctqv/M/

exe.dropper

http://earthinnovation.org/pcimonitor/d/

exe.dropper

http://pastaciyiz.biz/wp-includes/1/

Targets

    • Target

      00cfe4c12602c2d1250c999e3b4172d6_JaffaCakes118

    • Size

      223KB

    • MD5

      00cfe4c12602c2d1250c999e3b4172d6

    • SHA1

      d7e3f205f18794d85a182714be06cfdc3ec84a0a

    • SHA256

      81ab49b690e1bbdc91e690b222a2c7d3bb5edacc027d2db853fc4bff6e68fc2e

    • SHA512

      65b8fdaf2d0cfb0d814b808bd610af37ec5de2c0109922b5eea68d9402434040f789c5155f21e471e1c09c7dda41c439fe9c4722e99ca3e15f753019fa7c8b34

    • SSDEEP

      3072:lV4PrXcuQuvpzm4bkiaMQgAlSGF62ezg24i:cDRv1m4bnQgISGF6Lg24i

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks