General
-
Target
0c9bf188df6018db8daecd7d6f8e73a0_JaffaCakes118
-
Size
197KB
-
Sample
240501-xrx41agc73
-
MD5
0c9bf188df6018db8daecd7d6f8e73a0
-
SHA1
eae18ce7a7eb286e960f4b6fbcd014780cb06c74
-
SHA256
f43e11eca26da901a30dda136c7039b3abe7895ad174067ebd0a0639c7c750a5
-
SHA512
c9eb4e84ddccff8bc88125294d961c5bdf2a9a99ed24448176c0d5c5cdcb81e29eaf21e909006ea3bcf68f5c413dabd6ecf0ad451d975d1f873c72c1b6ba6bba
-
SSDEEP
3072:z12y/Gdy3ktGDWLS0HZWD5w8K7Nk9LD7IBUVhXiEt0g0jndK:z12k4ftGiL3HJk9LD7bVhXV0fjnc
Static task
static1
Behavioral task
behavioral1
Sample
0c9bf188df6018db8daecd7d6f8e73a0_JaffaCakes118.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0c9bf188df6018db8daecd7d6f8e73a0_JaffaCakes118.doc
Resource
win10v2004-20240419-en
Malware Config
Extracted
https://maelkajangcanopy.com/wp-admin/JBiRPnVvr/
https://stylewebcruze.online/images/WLReuvW/
https://stperformance.co.uk/wp-admin/toubufsC/
http://jandmadventuring.servermaintain.com/wp-content/uploads/cjy4-j423i30-616378266/
https://www.liuxuebook.com/wp-content/BEtxnxQWn/
Targets
-
-
Target
0c9bf188df6018db8daecd7d6f8e73a0_JaffaCakes118
-
Size
197KB
-
MD5
0c9bf188df6018db8daecd7d6f8e73a0
-
SHA1
eae18ce7a7eb286e960f4b6fbcd014780cb06c74
-
SHA256
f43e11eca26da901a30dda136c7039b3abe7895ad174067ebd0a0639c7c750a5
-
SHA512
c9eb4e84ddccff8bc88125294d961c5bdf2a9a99ed24448176c0d5c5cdcb81e29eaf21e909006ea3bcf68f5c413dabd6ecf0ad451d975d1f873c72c1b6ba6bba
-
SSDEEP
3072:z12y/Gdy3ktGDWLS0HZWD5w8K7Nk9LD7IBUVhXiEt0g0jndK:z12k4ftGiL3HJk9LD7bVhXV0fjnc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-