General

  • Target

    020a5d748b0d94c1834d06d814af1ee1_JaffaCakes118

  • Size

    99KB

  • Sample

    240427-a7mlwagd6t

  • MD5

    020a5d748b0d94c1834d06d814af1ee1

  • SHA1

    c53f530373e52bf00030f942d8c7c9354a5dfb01

  • SHA256

    144ed374a219a0aca02308a22b1e5a7deeb1b50b941f20f62df14a154c917339

  • SHA512

    2cdc8cc7058e48e1731f35c22b1325a7b698167e8980213064950fd78714caa5d18f233e951056571c292eaadc2ded125e618f524602a309c9dd7dfdd95175c3

  • SSDEEP

    1536:4iocn1kp59gxBK85fBiFkaob1z9WcpRWJ+a9Y:4f41k/W48oFkjb1z9Wcfx

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://intraelectronics.com/9CBQqGip_YBdeLeOmn

exe.dropper

http://linkingphase.com/Ye09uJm_1TJzK_0

exe.dropper

http://radwomenbusinessowners.com/pnKAX_FAi9jc

exe.dropper

http://www.motoruitjes.nl/BrG_4Tb3uEk0N

exe.dropper

http://kantova.com/xRVVM3r_gsFZOEnE

Targets

    • Target

      020a5d748b0d94c1834d06d814af1ee1_JaffaCakes118

    • Size

      99KB

    • MD5

      020a5d748b0d94c1834d06d814af1ee1

    • SHA1

      c53f530373e52bf00030f942d8c7c9354a5dfb01

    • SHA256

      144ed374a219a0aca02308a22b1e5a7deeb1b50b941f20f62df14a154c917339

    • SHA512

      2cdc8cc7058e48e1731f35c22b1325a7b698167e8980213064950fd78714caa5d18f233e951056571c292eaadc2ded125e618f524602a309c9dd7dfdd95175c3

    • SSDEEP

      1536:4iocn1kp59gxBK85fBiFkaob1z9WcpRWJ+a9Y:4f41k/W48oFkjb1z9Wcfx

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks