General

  • Target

    1fd62837c7bc316204fcfae88fa593bd_JaffaCakes118

  • Size

    160KB

  • Sample

    240507-hy7vfsha94

  • MD5

    1fd62837c7bc316204fcfae88fa593bd

  • SHA1

    d620ce08238f2edac8d510b2ef6bb26e187d3b3b

  • SHA256

    1a6342aa6a54cf5fadfce1d87f53798968f7c1a9cab190f9a72f28a2de876813

  • SHA512

    1def9cef38f345cf8655e7dbe1da414c524bddb82ecba77ae065cf21bfeceec9c6515afbeb37f5ce32c8b84e42a7ec6ecd1b5ea8dc1c4741448d59f3bb8992bc

  • SSDEEP

    3072:+lg43I9ltdw3srUDVEdkPKK3fnkJiXW4An0FWm3xDPwUtUFW+:+lN43A3mUREYflQn0FVuiUFT

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://rhlnetwork.com/uuf31PTan3

exe.dropper

http://eventcherry.com/EPRpYDL

exe.dropper

http://themodellabel.com/QByaBRWa

exe.dropper

http://128.199.172.4/J1EuGgi0sx

exe.dropper

http://207.154.223.104/sycTwoHI4

Targets

    • Target

      1fd62837c7bc316204fcfae88fa593bd_JaffaCakes118

    • Size

      160KB

    • MD5

      1fd62837c7bc316204fcfae88fa593bd

    • SHA1

      d620ce08238f2edac8d510b2ef6bb26e187d3b3b

    • SHA256

      1a6342aa6a54cf5fadfce1d87f53798968f7c1a9cab190f9a72f28a2de876813

    • SHA512

      1def9cef38f345cf8655e7dbe1da414c524bddb82ecba77ae065cf21bfeceec9c6515afbeb37f5ce32c8b84e42a7ec6ecd1b5ea8dc1c4741448d59f3bb8992bc

    • SSDEEP

      3072:+lg43I9ltdw3srUDVEdkPKK3fnkJiXW4An0FWm3xDPwUtUFW+:+lN43A3mUREYflQn0FVuiUFT

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks