General

  • Target

    d3c91738ad52ede18e7c98de0d688ee4_JaffaCakes118

  • Size

    79KB

  • Sample

    240908-hmvezsvalg

  • MD5

    d3c91738ad52ede18e7c98de0d688ee4

  • SHA1

    b86e74fc6dc8d932006f3c189a743ed020cc0f77

  • SHA256

    6dc235b67ec03448dd547ba027bb18ebb7131429138a85b9aaf9dc74933e1683

  • SHA512

    f5dff51d938b2585f7b270a441ce23645b70906f566da72b7ea2ff1fad8beb97c257e6582657a6d84f5141172bc929388a19b9cf9c7e2af32b20a1a31226b4c1

  • SSDEEP

    1536:vJK+lhLocn1kp59gxBK85fBt+a9pjduedt9+d5paxyN2:vJbla41k/W48jjduedt9+d5paxyQ

Malware Config

Targets

    • Target

      d3c91738ad52ede18e7c98de0d688ee4_JaffaCakes118

    • Size

      79KB

    • MD5

      d3c91738ad52ede18e7c98de0d688ee4

    • SHA1

      b86e74fc6dc8d932006f3c189a743ed020cc0f77

    • SHA256

      6dc235b67ec03448dd547ba027bb18ebb7131429138a85b9aaf9dc74933e1683

    • SHA512

      f5dff51d938b2585f7b270a441ce23645b70906f566da72b7ea2ff1fad8beb97c257e6582657a6d84f5141172bc929388a19b9cf9c7e2af32b20a1a31226b4c1

    • SSDEEP

      1536:vJK+lhLocn1kp59gxBK85fBt+a9pjduedt9+d5paxyN2:vJbla41k/W48jjduedt9+d5paxyQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks