General

  • Target

    023d5e46aefa8731f4301d383fde5428_JaffaCakes118

  • Size

    175KB

  • Sample

    240427-c8lr3shd79

  • MD5

    023d5e46aefa8731f4301d383fde5428

  • SHA1

    8b39e46e65e0d7f3600fd8497141f8758b435f69

  • SHA256

    1e4b706d611f935dd5aaac2b97e921c9c1df152d9dcf98127840b7c0e60348ee

  • SHA512

    e73fb132cf4e959f716dc242b3c63ad6f678f6fed387966a63e324b25ce1f3ca031cbb4085f6ef9bc44de59e4b755f3632bbd1830c1cadffe1273d644c1fd25d

  • SSDEEP

    3072:J4PrXcuQuvpzm4bkiaMQgAlSeRu5pZT/yIYERRH:+DRv1m4bnQgISeRu5pZT/yIYERRH

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://nwcsvcs.com/cgi-bin/uz6_qs8_qr/

exe.dropper

http://odessaresources.com/cgi-bin/3_o_but9/

exe.dropper

https://onefarmdesign.com/cgi-bin/u_fig_m2mv/

exe.dropper

http://onewithyoucd.com/_mm/oix_ktcpc_dljhsex/

exe.dropper

http://www.piemonteitinera.net/n_g2o4_jumkt4/

Targets

    • Target

      023d5e46aefa8731f4301d383fde5428_JaffaCakes118

    • Size

      175KB

    • MD5

      023d5e46aefa8731f4301d383fde5428

    • SHA1

      8b39e46e65e0d7f3600fd8497141f8758b435f69

    • SHA256

      1e4b706d611f935dd5aaac2b97e921c9c1df152d9dcf98127840b7c0e60348ee

    • SHA512

      e73fb132cf4e959f716dc242b3c63ad6f678f6fed387966a63e324b25ce1f3ca031cbb4085f6ef9bc44de59e4b755f3632bbd1830c1cadffe1273d644c1fd25d

    • SSDEEP

      3072:J4PrXcuQuvpzm4bkiaMQgAlSeRu5pZT/yIYERRH:+DRv1m4bnQgISeRu5pZT/yIYERRH

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks