General
-
Target
fae13812d8feb6b29dc72430c638a728_JaffaCakes118
-
Size
216KB
-
Sample
240419-wrl63abe66
-
MD5
fae13812d8feb6b29dc72430c638a728
-
SHA1
0c0833a962d410557d4fa31481d259b80d65e61d
-
SHA256
1f325ca84c44d05053b8a29a083b40ba8533aa2490a12aac76030188aef8d028
-
SHA512
37b3aee7c5a2ae5d5722cf600cbd7f8d00c034013960700edbdba449348dbba31a69f7eae1866c9b36a9598f91e0c51c9ef24d72e73f819a426f65b73f278903
-
SSDEEP
6144:Sys7MOD8srVURv59QexqaFLLaL8x9Hp63at:Xs7MOHyRBmezFHaL8Rp6K
Behavioral task
behavioral1
Sample
fae13812d8feb6b29dc72430c638a728_JaffaCakes118.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fae13812d8feb6b29dc72430c638a728_JaffaCakes118.xlsm
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
fae13812d8feb6b29dc72430c638a728_JaffaCakes118
-
Size
216KB
-
MD5
fae13812d8feb6b29dc72430c638a728
-
SHA1
0c0833a962d410557d4fa31481d259b80d65e61d
-
SHA256
1f325ca84c44d05053b8a29a083b40ba8533aa2490a12aac76030188aef8d028
-
SHA512
37b3aee7c5a2ae5d5722cf600cbd7f8d00c034013960700edbdba449348dbba31a69f7eae1866c9b36a9598f91e0c51c9ef24d72e73f819a426f65b73f278903
-
SSDEEP
6144:Sys7MOD8srVURv59QexqaFLLaL8x9Hp63at:Xs7MOHyRBmezFHaL8Rp6K
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-