General

  • Target

    0cd2dc8f5077f4bbf3b937793970fa25_JaffaCakes118

  • Size

    76KB

  • Sample

    240501-zqs5rsaf66

  • MD5

    0cd2dc8f5077f4bbf3b937793970fa25

  • SHA1

    cd23e7cf92c31d0d61b717e3aa520f696e3a031d

  • SHA256

    0ee992c47ce36bb0ec5f69e73c1503daac08270193ffa3a8bfbcd9efccd903c5

  • SHA512

    cca2600b1dcc91903695d49d8914581604e15c18e043dbd95a3573593cae8412aa41fdb5d7e739f0de73d1cd3e59b80e8bdc0f6f0a158bb2786199d185212586

  • SSDEEP

    1536:zptJlmrJpmxlRw99NBF+a//zUmUmUlo/gGbc2+:9te2dw99fluNQc

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://bigsenindonesia.com/kYQ9UR0

exe.dropper

http://hotelnoraipro.com/iw0

exe.dropper

http://4theweb.co.uk/wwvvv/w3b

exe.dropper

http://andrewmiller.com.au/YJ7ro

exe.dropper

http://91.151.190.122/osticket/C1A9

Targets

    • Target

      0cd2dc8f5077f4bbf3b937793970fa25_JaffaCakes118

    • Size

      76KB

    • MD5

      0cd2dc8f5077f4bbf3b937793970fa25

    • SHA1

      cd23e7cf92c31d0d61b717e3aa520f696e3a031d

    • SHA256

      0ee992c47ce36bb0ec5f69e73c1503daac08270193ffa3a8bfbcd9efccd903c5

    • SHA512

      cca2600b1dcc91903695d49d8914581604e15c18e043dbd95a3573593cae8412aa41fdb5d7e739f0de73d1cd3e59b80e8bdc0f6f0a158bb2786199d185212586

    • SSDEEP

      1536:zptJlmrJpmxlRw99NBF+a//zUmUmUlo/gGbc2+:9te2dw99fluNQc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks