General

  • Target

    ef12da113bc33f90f1333f3f09c48aae_JaffaCakes118

  • Size

    153KB

  • Sample

    240921-e6lqeavgmj

  • MD5

    ef12da113bc33f90f1333f3f09c48aae

  • SHA1

    b9706a0643cd89f07e25a8f43ed1d7b601e00a00

  • SHA256

    418535f82699ce0df10d39ac2798fcce30da6070fb7b9b0f28562d1146f49e69

  • SHA512

    0bd2d34824323cfefc354dbb1808f6474d978637e059c6be6aa71147432a5954533c63fbf10d69dc8c054f87b8750c4c52f89fb7d5ba90ab0867b7e5051f64b1

  • SSDEEP

    1536:hAkT3yRFGEv0QtKPaOtMPAquK1gLadmpsHkkyeY+tB445TEgrO3jSWAg83tle1Ze:022TWTogk079THcpOu5UZ+rEuH

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.firhajshoes.com/wp-admin/RgaiT/

exe.dropper

http://fakeread.com/OneSignal-Web-SDK-HTTPS-Integration-Files/Wf/

exe.dropper

http://www.rttutoring.com/wp-includes/LlbY6o/

exe.dropper

http://blueskysol.com/sys-cache/2Rk/

exe.dropper

http://crazyboxs.com/cgi-bin/IaJ/

exe.dropper

http://www.paramedicaleducationguidelines.com/wp-admin/3jXU5Bp/

exe.dropper

http://nuhatoys.com/wp-admin/WWA4R/

Targets

    • Target

      ef12da113bc33f90f1333f3f09c48aae_JaffaCakes118

    • Size

      153KB

    • MD5

      ef12da113bc33f90f1333f3f09c48aae

    • SHA1

      b9706a0643cd89f07e25a8f43ed1d7b601e00a00

    • SHA256

      418535f82699ce0df10d39ac2798fcce30da6070fb7b9b0f28562d1146f49e69

    • SHA512

      0bd2d34824323cfefc354dbb1808f6474d978637e059c6be6aa71147432a5954533c63fbf10d69dc8c054f87b8750c4c52f89fb7d5ba90ab0867b7e5051f64b1

    • SSDEEP

      1536:hAkT3yRFGEv0QtKPaOtMPAquK1gLadmpsHkkyeY+tB445TEgrO3jSWAg83tle1Ze:022TWTogk079THcpOu5UZ+rEuH

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks