General

  • Target

    5ebbd3592172894f72dcff4fa67a8140_JaffaCakes118

  • Size

    174KB

  • Sample

    240520-m5n35sge83

  • MD5

    5ebbd3592172894f72dcff4fa67a8140

  • SHA1

    2be240b8fa5155765086ac325e7b1f55d5dd1750

  • SHA256

    0a3a43586443c87bb11108697927389ef23bab9ba0bee5d4d84b49420ed137e2

  • SHA512

    bdacc3dc09b84409bee5ff8e2f7a9d9c4b4eac97c2b3cf874c2319b8ffec8289f46621279d9f12bd2eb2f962df7332905aa689492cac61c2af5b27ba93c472f0

  • SSDEEP

    3072:mxjnB29gb8onQTSvhx3rezujg8ZfE5oPn0aw7:mxyzT4hdqWeWnP

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://autoinfomag.com/ID

exe.dropper

http://www.spor.advertisetr.com/doc/En_us/Jul2018/St2iT8u

exe.dropper

http://inicjatywa.edu.pl//YOhCS

exe.dropper

http://alumni.poltekba.ac.id/1xQIqKu

exe.dropper

http://acemmadencilik.com.tr/XfFTSrw

Targets

    • Target

      5ebbd3592172894f72dcff4fa67a8140_JaffaCakes118

    • Size

      174KB

    • MD5

      5ebbd3592172894f72dcff4fa67a8140

    • SHA1

      2be240b8fa5155765086ac325e7b1f55d5dd1750

    • SHA256

      0a3a43586443c87bb11108697927389ef23bab9ba0bee5d4d84b49420ed137e2

    • SHA512

      bdacc3dc09b84409bee5ff8e2f7a9d9c4b4eac97c2b3cf874c2319b8ffec8289f46621279d9f12bd2eb2f962df7332905aa689492cac61c2af5b27ba93c472f0

    • SSDEEP

      3072:mxjnB29gb8onQTSvhx3rezujg8ZfE5oPn0aw7:mxyzT4hdqWeWnP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks