General
-
Target
113c78cca7bcb3422669ab5d30223d24_JaffaCakes118
-
Size
175KB
-
Sample
240504-cv2alsah7y
-
MD5
113c78cca7bcb3422669ab5d30223d24
-
SHA1
e687532ec20b9b3ffd5770b3cbcea45c4cd9516f
-
SHA256
52b222374831f845dcf2ceb94ddf3a7e56ff1b2401ca994464a2cc99cbe60aec
-
SHA512
e1c6e283b9336ef0fafda72e5731178384ac9165c23bba62aa5a1d66817ae056429096c938f20edc0ee82df66f95326489b06267b3bb942643ddbff5bd481412
-
SSDEEP
3072:O9ufstRUUKSns8T00JSHUgteMJ8qMD7gTaBBGB4c:O9ufsfgIf0pLuBBGB4c
Static task
static1
Behavioral task
behavioral1
Sample
113c78cca7bcb3422669ab5d30223d24_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
113c78cca7bcb3422669ab5d30223d24_JaffaCakes118.doc
Resource
win10v2004-20240419-en
Malware Config
Extracted
http://bonyanet.com/wp-admin/iR/
http://ofoghzagros.com/wp-admin/H/
https://ilinknepal.com/infosysnepal.com/Zdz/
https://storypostar.com/wp-admin/j/
https://www.pixelstoryteller.com/hydroplane-definition/wzb/
https://redchillicrackers.com/wp-content/p/
http://www.co-traveling.com/cgi-bin/003/
Targets
-
-
Target
113c78cca7bcb3422669ab5d30223d24_JaffaCakes118
-
Size
175KB
-
MD5
113c78cca7bcb3422669ab5d30223d24
-
SHA1
e687532ec20b9b3ffd5770b3cbcea45c4cd9516f
-
SHA256
52b222374831f845dcf2ceb94ddf3a7e56ff1b2401ca994464a2cc99cbe60aec
-
SHA512
e1c6e283b9336ef0fafda72e5731178384ac9165c23bba62aa5a1d66817ae056429096c938f20edc0ee82df66f95326489b06267b3bb942643ddbff5bd481412
-
SSDEEP
3072:O9ufstRUUKSns8T00JSHUgteMJ8qMD7gTaBBGB4c:O9ufsfgIf0pLuBBGB4c
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-