General

  • Target

    4847b716fc3b2624632b1989281fe962_JaffaCakes118

  • Size

    154KB

  • Sample

    240515-159lqseg2t

  • MD5

    4847b716fc3b2624632b1989281fe962

  • SHA1

    f408b6ffd6175eb94fde991ef6efc7ea8c6e139e

  • SHA256

    a925c1994799c45a872e4fdd041abc3594348fd38a13e9a935982fbb69f91735

  • SHA512

    ae99776f9f5ceaec2f83fade5ddad41d91e4e541bdcb909699d4cb653de00d7e04da9fdc536c8610408d057397651251a781d6afc5e21de11db036b64b4104ca

  • SSDEEP

    1536:gURA+F6URA+Fhrdi1Ir77zOH98Wj2gpngd+a92xQIY0y+Wbxw:frfrzOH98ipguxDH7Axw

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://qstride.com/img/1W/

exe.dropper

http://syracusecoffee.com/customer/i/

exe.dropper

http://shahrakyar.com/cms/3e/

exe.dropper

http://vuatritue.com/wp-admin/FkX/

exe.dropper

http://glafka.com/wp-content/2L7/

exe.dropper

http://rovrooftiles.com/wp-includes/nDP/

exe.dropper

http://paulospainting.com/wp-includes/7k/

Targets

    • Target

      4847b716fc3b2624632b1989281fe962_JaffaCakes118

    • Size

      154KB

    • MD5

      4847b716fc3b2624632b1989281fe962

    • SHA1

      f408b6ffd6175eb94fde991ef6efc7ea8c6e139e

    • SHA256

      a925c1994799c45a872e4fdd041abc3594348fd38a13e9a935982fbb69f91735

    • SHA512

      ae99776f9f5ceaec2f83fade5ddad41d91e4e541bdcb909699d4cb653de00d7e04da9fdc536c8610408d057397651251a781d6afc5e21de11db036b64b4104ca

    • SSDEEP

      1536:gURA+F6URA+Fhrdi1Ir77zOH98Wj2gpngd+a92xQIY0y+Wbxw:frfrzOH98ipguxDH7Axw

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks