General

  • Target

    031d2c1ec2390f52dc96b2de0e2eed6f_JaffaCakes118

  • Size

    61KB

  • Sample

    240427-m8bbfshg91

  • MD5

    031d2c1ec2390f52dc96b2de0e2eed6f

  • SHA1

    9aca6a1d1fa4702b0d58ea85c9ecef86e06fe234

  • SHA256

    a5673b432230ad4f3a112840f293249d492f03edc5893d988e35621e4931ba8b

  • SHA512

    8243e501a4fe9dedb65cb33515788e3cdf33f1f210495d42b62c6ece51295c90be5020c7854554bb20f36da967d43280b8b327e73fc588ec9a56b02f442d61af

  • SSDEEP

    1536:aO+eUd+OApUP2JCZpMfANCGImXMOtOeJpydf0gfJMPSgTFJ:xbADdMYujOtOeJpyd8giPSgTFJ

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://cnnmediaservices.com/wp-admin/czBMOhz/

exe.dropper

http://ak3.net/t0XJ/

exe.dropper

http://ovday.com/1umq/S5IWl04/

exe.dropper

http://gch7.com/wp-includes/Nkwp/

exe.dropper

http://chengmikeji.com/wp-includes/9QQ/

exe.dropper

http://blog.anseeing.com/sys-cache/h/

exe.dropper

http://1sync-wp.x.opencrm.eu/wp-content/Bu/

Targets

    • Target

      sample

    • Size

      152KB

    • MD5

      6813de519880958868d49beb2bc27293

    • SHA1

      bfd2935e70ae513bf2b2036eade1e476086436d1

    • SHA256

      1c71f8ea6feb7151e43dd7a022fed82103545c6e079231fd59df26e00bcdb66b

    • SHA512

      083feba93f1e647a757e7ef0d5f53322e51e896654f8b1363d49a1c3d7927ca0843753ac89bbe31700acd346a5c67cc74087abbd8a43e163ade9edffdc5498fe

    • SSDEEP

      1536:VCOIDQhDHR4OIDQhDHRdrdi1Ir77zOH98Wj2gpngB+a9r7Qb4HrO4u2Hg:VzrfrzOH98ipgH7I4HrO4u2Hg

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks