General

  • Target

    65a045b3e7cb246a0d73e75468b8273d_JaffaCakes118

  • Size

    87KB

  • Sample

    240522-cgwg7sgh33

  • MD5

    65a045b3e7cb246a0d73e75468b8273d

  • SHA1

    0f96771da3efd722bd337ca57f3514ba30e0f351

  • SHA256

    e80762c5909a3c7f409c3f0273ed96154fc887463b6748a0a42cad16fadbf6e5

  • SHA512

    42a202314570aa5963a7de0b0a386488ea48f3193015a2005f290419ee30aa574eaefc5beba38a34f99cb97e1c6c098c701a07b782879736b6daaf36e912473a

  • SSDEEP

    1536:Yl0suyCPocn1kp59gxBK85fB7s+aM14E0/SO8Mkk:uu241k/W48cp

Malware Config

Targets

    • Target

      65a045b3e7cb246a0d73e75468b8273d_JaffaCakes118

    • Size

      87KB

    • MD5

      65a045b3e7cb246a0d73e75468b8273d

    • SHA1

      0f96771da3efd722bd337ca57f3514ba30e0f351

    • SHA256

      e80762c5909a3c7f409c3f0273ed96154fc887463b6748a0a42cad16fadbf6e5

    • SHA512

      42a202314570aa5963a7de0b0a386488ea48f3193015a2005f290419ee30aa574eaefc5beba38a34f99cb97e1c6c098c701a07b782879736b6daaf36e912473a

    • SSDEEP

      1536:Yl0suyCPocn1kp59gxBK85fB7s+aM14E0/SO8Mkk:uu241k/W48cp

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks