Table of Contents
A 1,047-byte ZIP file. That is all it took. Inside: a JavaScript dropper disguised as a TurboTax installer. The script called PowerShell to fetch a remote binary from a known malware distribution domain, wrote it to disk under a fake .mp3 extension, and registered a daily scheduled task to keep it running. Alongside the ZIP, a seemingly ordinary JPEG image contained multiple Windows executables hidden at specific byte offsets, each with a distinct hash. Three evasion layers, one email, and a payload architecture designed to survive both scanning and reboots.
This malware delivery campaign targeted an employee at a North American automotive components manufacturer. The email used a TurboTax tax-preparation theme as the social engineering hook, complete with a professional-looking signature block claiming the sender held an "IT Security Analyst" title. The message arrived through Microsoft Exchange Online infrastructure and was initially quarantined by Microsoft's antispam engine, categorized as AMP (Advanced Malware Protection). It was subsequently released from quarantine into the recipient's inbox.
A 1,669-Byte Script That Does Everything
The ZIP archive (TurboTax-deluxe-setup-app-24-6-32-EXE.zip) contained a single file: TurboTax-deluxe-setup-app-24-6-32-EXE.js. At 1,669 bytes, it fits in a single terminal screen. But those bytes pack a complete attack chain.
The JavaScript constructs a batch file at runtime, then executes it. That batch file invokes PowerShell's Invoke-WebRequest cmdlet to download a file from hxxp://dr5[.]org/in.mp3 and save it to disk. The .mp3 extension is a deliberate misdirection. Network-level file type filters that inspect extensions rather than content let it through. The actual payload is a binary executable.
After the download, the script calls SCHTASKS /Create /SC DAILY /TN to register a Windows scheduled task that runs the downloaded payload once per day. This is T1053.005 (Scheduled Task/Job) in the MITRE ATT&CK framework. It survives reboots. It runs silently. And unless someone specifically audits scheduled tasks, it persists indefinitely.
The script also references hxxp://l77[.]org/downloading.php?dl=turbotax as an additional payload source. The domain l77[.]org is documented in third-party threat intelligence (Dr.Web) as active malware distribution infrastructure. Both payload URLs use HTTP, not HTTPS, which simplifies interception but also avoids certificate validation failures on restrictive networks.
Executables Inside a JPEG: Steganography in Practice
The second attachment, image001.jpg (105,014 bytes), looked like a standard image. It was not. Sandbox analysis identified multiple MZ signatures at different byte offsets within the file. MZ is the magic number that marks the start of a Windows Portable Executable. Three distinct binary blobs were extracted from the image, each with a unique SHA256 hash.
This is T1027.003 (Obfuscated Files or Information: Steganography). The technique works because JPEG parsers read the image data and stop. They do not examine bytes appended beyond the JPEG end-of-image marker. Antivirus scanners that validate the file as a "clean JPEG" based on its header and visible structure miss the embedded executables entirely.
The Verizon 2024 DBIR found that 24% of breaches involved malware, and the median time to click a phishing email was 21 seconds. When the payload is an image that renders normally in a preview pane, the window for user-side detection effectively closes.
See Your Risk: Calculate how many threats your SEG is missing
Why the Gateway Caught It and Then Let It Through
Microsoft Exchange Online Protection flagged this message. The X-Forefront-Antispam-Report header shows CAT:AMP, meaning Microsoft classified it as containing advanced malware. The message was quarantined. Then it was released.
The X-MS-Exchange-Generated-Message-Source: Antispam Quarantine Agent header confirms the release came from the quarantine system. No DKIM signature was present. DMARC returned none. The email passed through the gateway on internal routing trust alone.
This is the gap that Adaptive AI exists to close. A quarantine-and-release workflow depends on someone (or some policy) making the correct call every time. According to the Microsoft Digital Defense Report 2024, Microsoft processes over 78 trillion security signals daily. But a single incorrect quarantine release negates all upstream detection. Behavioral analysis that evaluates the attachment context, sender anomaly, and delivery chain catches what static quarantine decisions miss.
MITRE ATT&CK Mapping
| Technique | ID | Relevance |
|---|---|---|
| Phishing: Spearphishing Attachment | T1566.001 | ZIP with JS dropper delivered via email |
| Command and Scripting Interpreter: PowerShell | T1059.001 | PowerShell Invoke-WebRequest downloads payload |
| Scheduled Task/Job: Scheduled Task | T1053.005 | SCHTASKS /Create /SC DAILY for persistence |
| Obfuscated Files: Steganography | T1027.003 | PE executables embedded in JPEG at hidden offsets |
| Ingress Tool Transfer | T1105 | Remote binary download via HTTP |
What to Hunt for Tomorrow Morning
If this payload executed in your environment, the forensic artifacts are distinctive. Search for:
- Scheduled tasks created by non-administrative users that reference downloaded files or unfamiliar paths. The
SCHTASKS /Create /SC DAILYpattern with a/TNtask name is the fingerprint. - PowerShell execution logs containing
Invoke-WebRequestpaired with-OutFiletargeting unexpected directories. Enable PowerShell ScriptBlock Logging (CISA guidance) if you have not already. - DNS/proxy logs for
l77[.]organddr5[.]org. Any historical resolution to these domains warrants immediate host containment. - Image attachments over 50KB in quarantine queues. Run binary analysis (not just MIME-type validation) to detect embedded MZ signatures. The FBI IC3 2024 report documented $12.5 billion in cybercrime losses, with phishing remaining the top initial access vector.
- Outbound HTTP requests (not HTTPS) to unfamiliar domains downloading files with misleading extensions (.mp3, .jpg, .png masking executables).
The combination of a sub-2KB dropper, living-off-the-land PowerShell execution, scheduled task persistence, and steganographic payload storage represents a mature attack toolkit. Each technique individually is well-documented. Stacked together in a single email with a tax-software social engineering wrapper, they create a delivery chain that most signature-based defenses evaluate as five separate, individually benign components rather than one coordinated intrusion attempt.
Indicators of Compromise
| Type | Indicator | Context |
|---|---|---|
| Attachment (ZIP) | TurboTax-deluxe-setup-app-24-6-32-EXE.zip | Malicious ZIP, MD5: dfeedbabf50cdb0005cde82a733c9d76 |
| Attachment (ZIP) SHA256 | 12d65f88ec3a077c34425598341dcfbf117686e8279cb7723806ec4db9db2b55 | ZIP file hash |
| Nested JS Dropper | TurboTax-deluxe-setup-app-24-6-32-EXE.js | JavaScript dropper, 1,669 bytes |
| Nested JS SHA256 | 957fd6e6a52f8e12430459e2560a1739e2c4479313e047290a39abd58cc4ecf4 | JS file hash |
| URL | hxxp://l77[.]org/downloading.php?dl=turbotax | Malware distribution endpoint (Dr.Web documented) |
| URL | hxxp://dr5[.]org/in.mp3 | Payload download, binary disguised as .mp3 |
| Domain | l77[.]org | Malware distribution infrastructure |
| Domain | dr5[.]org | Payload staging infrastructure |
| Image | image001.jpg (105,014 bytes) | JPEG with embedded MZ executables |
| Image MD5 | 85070f112ddb927d62d764f1ee6daa0d | Steganographic carrier image |
| Image SHA256 | 302d957e4debd925118d71c6ea21bde67a42bdf7b9d8c284bc6d5fd565229180 | Carrier image hash |
| Extracted Blob SHA256 | 351f247671a644d541c6d111b654902bfefee3eb8c340c804cef6af854122989 | PE binary extracted from JPEG offset 55023 |
| Extracted Blob SHA256 | 830cd3decd57de5274e024a69e1c30f9699136614134fbfca1f8a547a37436be | PE binary extracted from JPEG offset 81219 |
| Extracted Blob SHA256 | 1151e2795523f941e41d45de2b0abd5fd9e79289ddbfcd4b35a894a0b8c97af0 | PE binary extracted from JPEG offset 96419 |
Explore More Articles
Say goodbye to Phishing, BEC, and QR code attacks. Our Adaptive AI automatically learns and evolves to keep your employees safe from email attacks.