Hidden in Plain Sight: Executables Buried Inside a JPEG and a 1KB ZIP

TL;DR A malicious email delivered a TurboTax-themed ZIP containing a JavaScript dropper that invoked PowerShell to download a disguised binary from a known malware distribution domain. The script created a daily scheduled task for persistent execution. A companion JPEG image embedded multiple MZ-signature executables at hidden byte offsets, a textbook steganographic payload delivery technique. The attack combined social engineering, living-off-the-land binaries, and multi-stage evasion.
Severity: Critical Malware Delivery Steganography Persistence MITRE: T1566.001 MITRE: T1059.001 MITRE: T1053.005 MITRE: T1027.003 MITRE: T1105

A 1,047-byte ZIP file. That is all it took. Inside: a JavaScript dropper disguised as a TurboTax installer. The script called PowerShell to fetch a remote binary from a known malware distribution domain, wrote it to disk under a fake .mp3 extension, and registered a daily scheduled task to keep it running. Alongside the ZIP, a seemingly ordinary JPEG image contained multiple Windows executables hidden at specific byte offsets, each with a distinct hash. Three evasion layers, one email, and a payload architecture designed to survive both scanning and reboots.

This malware delivery campaign targeted an employee at a North American automotive components manufacturer. The email used a TurboTax tax-preparation theme as the social engineering hook, complete with a professional-looking signature block claiming the sender held an "IT Security Analyst" title. The message arrived through Microsoft Exchange Online infrastructure and was initially quarantined by Microsoft's antispam engine, categorized as AMP (Advanced Malware Protection). It was subsequently released from quarantine into the recipient's inbox.

A 1,669-Byte Script That Does Everything

The ZIP archive (TurboTax-deluxe-setup-app-24-6-32-EXE.zip) contained a single file: TurboTax-deluxe-setup-app-24-6-32-EXE.js. At 1,669 bytes, it fits in a single terminal screen. But those bytes pack a complete attack chain.

The JavaScript constructs a batch file at runtime, then executes it. That batch file invokes PowerShell's Invoke-WebRequest cmdlet to download a file from hxxp://dr5[.]org/in.mp3 and save it to disk. The .mp3 extension is a deliberate misdirection. Network-level file type filters that inspect extensions rather than content let it through. The actual payload is a binary executable.

After the download, the script calls SCHTASKS /Create /SC DAILY /TN to register a Windows scheduled task that runs the downloaded payload once per day. This is T1053.005 (Scheduled Task/Job) in the MITRE ATT&CK framework. It survives reboots. It runs silently. And unless someone specifically audits scheduled tasks, it persists indefinitely.

The script also references hxxp://l77[.]org/downloading.php?dl=turbotax as an additional payload source. The domain l77[.]org is documented in third-party threat intelligence (Dr.Web) as active malware distribution infrastructure. Both payload URLs use HTTP, not HTTPS, which simplifies interception but also avoids certificate validation failures on restrictive networks.

Executables Inside a JPEG: Steganography in Practice

The second attachment, image001.jpg (105,014 bytes), looked like a standard image. It was not. Sandbox analysis identified multiple MZ signatures at different byte offsets within the file. MZ is the magic number that marks the start of a Windows Portable Executable. Three distinct binary blobs were extracted from the image, each with a unique SHA256 hash.

This is T1027.003 (Obfuscated Files or Information: Steganography). The technique works because JPEG parsers read the image data and stop. They do not examine bytes appended beyond the JPEG end-of-image marker. Antivirus scanners that validate the file as a "clean JPEG" based on its header and visible structure miss the embedded executables entirely.

The Verizon 2024 DBIR found that 24% of breaches involved malware, and the median time to click a phishing email was 21 seconds. When the payload is an image that renders normally in a preview pane, the window for user-side detection effectively closes.

See Your Risk: Calculate how many threats your SEG is missing

Why the Gateway Caught It and Then Let It Through

Microsoft Exchange Online Protection flagged this message. The X-Forefront-Antispam-Report header shows CAT:AMP, meaning Microsoft classified it as containing advanced malware. The message was quarantined. Then it was released.

The X-MS-Exchange-Generated-Message-Source: Antispam Quarantine Agent header confirms the release came from the quarantine system. No DKIM signature was present. DMARC returned none. The email passed through the gateway on internal routing trust alone.

This is the gap that Adaptive AI exists to close. A quarantine-and-release workflow depends on someone (or some policy) making the correct call every time. According to the Microsoft Digital Defense Report 2024, Microsoft processes over 78 trillion security signals daily. But a single incorrect quarantine release negates all upstream detection. Behavioral analysis that evaluates the attachment context, sender anomaly, and delivery chain catches what static quarantine decisions miss.

MITRE ATT&CK Mapping

TechniqueIDRelevance
Phishing: Spearphishing AttachmentT1566.001ZIP with JS dropper delivered via email
Command and Scripting Interpreter: PowerShellT1059.001PowerShell Invoke-WebRequest downloads payload
Scheduled Task/Job: Scheduled TaskT1053.005SCHTASKS /Create /SC DAILY for persistence
Obfuscated Files: SteganographyT1027.003PE executables embedded in JPEG at hidden offsets
Ingress Tool TransferT1105Remote binary download via HTTP

What to Hunt for Tomorrow Morning

If this payload executed in your environment, the forensic artifacts are distinctive. Search for:

  1. Scheduled tasks created by non-administrative users that reference downloaded files or unfamiliar paths. The SCHTASKS /Create /SC DAILY pattern with a /TN task name is the fingerprint.
  2. PowerShell execution logs containing Invoke-WebRequest paired with -OutFile targeting unexpected directories. Enable PowerShell ScriptBlock Logging (CISA guidance) if you have not already.
  3. DNS/proxy logs for l77[.]org and dr5[.]org. Any historical resolution to these domains warrants immediate host containment.
  4. Image attachments over 50KB in quarantine queues. Run binary analysis (not just MIME-type validation) to detect embedded MZ signatures. The FBI IC3 2024 report documented $12.5 billion in cybercrime losses, with phishing remaining the top initial access vector.
  5. Outbound HTTP requests (not HTTPS) to unfamiliar domains downloading files with misleading extensions (.mp3, .jpg, .png masking executables).

The combination of a sub-2KB dropper, living-off-the-land PowerShell execution, scheduled task persistence, and steganographic payload storage represents a mature attack toolkit. Each technique individually is well-documented. Stacked together in a single email with a tax-software social engineering wrapper, they create a delivery chain that most signature-based defenses evaluate as five separate, individually benign components rather than one coordinated intrusion attempt.

Indicators of Compromise

TypeIndicatorContext
Attachment (ZIP)TurboTax-deluxe-setup-app-24-6-32-EXE.zipMalicious ZIP, MD5: dfeedbabf50cdb0005cde82a733c9d76
Attachment (ZIP) SHA25612d65f88ec3a077c34425598341dcfbf117686e8279cb7723806ec4db9db2b55ZIP file hash
Nested JS DropperTurboTax-deluxe-setup-app-24-6-32-EXE.jsJavaScript dropper, 1,669 bytes
Nested JS SHA256957fd6e6a52f8e12430459e2560a1739e2c4479313e047290a39abd58cc4ecf4JS file hash
URLhxxp://l77[.]org/downloading.php?dl=turbotaxMalware distribution endpoint (Dr.Web documented)
URLhxxp://dr5[.]org/in.mp3Payload download, binary disguised as .mp3
Domainl77[.]orgMalware distribution infrastructure
Domaindr5[.]orgPayload staging infrastructure
Imageimage001.jpg (105,014 bytes)JPEG with embedded MZ executables
Image MD585070f112ddb927d62d764f1ee6daa0dSteganographic carrier image
Image SHA256302d957e4debd925118d71c6ea21bde67a42bdf7b9d8c284bc6d5fd565229180Carrier image hash
Extracted Blob SHA256351f247671a644d541c6d111b654902bfefee3eb8c340c804cef6af854122989PE binary extracted from JPEG offset 55023
Extracted Blob SHA256830cd3decd57de5274e024a69e1c30f9699136614134fbfca1f8a547a37436bePE binary extracted from JPEG offset 81219
Extracted Blob SHA2561151e2795523f941e41d45de2b0abd5fd9e79289ddbfcd4b35a894a0b8c97af0PE binary extracted from JPEG offset 96419
Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.

Explore More Articles

Say goodbye to Phishing, BEC, and QR code attacks. Our Adaptive AI automatically learns and evolves to keep your employees safe from email attacks.