General
-
Target
1ee0336e030dc9d11b09d43f33cdb9ed_JaffaCakes118
-
Size
66KB
-
Sample
240507-a4hthsdf96
-
MD5
1ee0336e030dc9d11b09d43f33cdb9ed
-
SHA1
cf76616a5b3a58055407d69df9e2ebbba460ed48
-
SHA256
ff10e852973c6675fa1f623eb27ff70306ba607a25c976d78d9396731205ec0e
-
SHA512
78bf7942ad153c2e0c02add27d3b5a8af2385831893a20a8f8a20ab584f71ad88bf172cf4e9c76df928f1c31603c2cbf928ff7a5f547996efba1b5c0a43ecfe9
-
SSDEEP
1536:Az0Cye/Y8HvkktFDyL7PaSHCRM7PaqgZ3j2ksHLfxd:a0Cy6Y8sDXySHFjaTZzG
Behavioral task
behavioral1
Sample
1ee0336e030dc9d11b09d43f33cdb9ed_JaffaCakes118.docm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1ee0336e030dc9d11b09d43f33cdb9ed_JaffaCakes118.docm
Resource
win10v2004-20240419-en
Malware Config
Extracted
http://anymonbunrybgakbweew.com/s.php?id=dogc
http://cnhoteltex.com/Stat.count
http://anymonbunrybgakbweew.com/SS/dogc.tzm
Targets
-
-
Target
1ee0336e030dc9d11b09d43f33cdb9ed_JaffaCakes118
-
Size
66KB
-
MD5
1ee0336e030dc9d11b09d43f33cdb9ed
-
SHA1
cf76616a5b3a58055407d69df9e2ebbba460ed48
-
SHA256
ff10e852973c6675fa1f623eb27ff70306ba607a25c976d78d9396731205ec0e
-
SHA512
78bf7942ad153c2e0c02add27d3b5a8af2385831893a20a8f8a20ab584f71ad88bf172cf4e9c76df928f1c31603c2cbf928ff7a5f547996efba1b5c0a43ecfe9
-
SSDEEP
1536:Az0Cye/Y8HvkktFDyL7PaSHCRM7PaqgZ3j2ksHLfxd:a0Cy6Y8sDXySHFjaTZzG
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-