General
-
Target
23e51fa32cd82c6c4b38e6c4b69719fb_JaffaCakes118
-
Size
217KB
-
Sample
240508-jq3q7sac4y
-
MD5
23e51fa32cd82c6c4b38e6c4b69719fb
-
SHA1
a4e50bf4379260c9a51d264b9ade01ec551e3847
-
SHA256
f70cbc150d38fcc49d90a937173b8163acb965d5a694bf339847c156491c8d3e
-
SHA512
78152a2dcbe015608987cb570c26beb8168025866b28158544427f30236a9dd50a536c01bb82a9fb02545ad1ede19aa5c56a2e8d8debf120a6500dbf1d7c7cbb
-
SSDEEP
3072:vYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////R:x0uXnWFchmmcI/o1//+pgw39
Behavioral task
behavioral1
Sample
23e51fa32cd82c6c4b38e6c4b69719fb_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23e51fa32cd82c6c4b38e6c4b69719fb_JaffaCakes118.doc
Resource
win10v2004-20240419-en
Malware Config
Extracted
http://somosdrucken.com/upload/GGQL96W/
http://www.vedigitize.com/wp-includes/l9K6YJ/
http://www.sosyalben.org/hpKTnb/
http://www.sutomoresmestaj.net/menu/E/
http://www.traveltoharamain.com/cgi-bin/b/
http://www.thinkdesign4u.com/css/Rtc1/
https://www.mwk-bionik.de/fileadmin/vOJ/
Targets
-
-
Target
23e51fa32cd82c6c4b38e6c4b69719fb_JaffaCakes118
-
Size
217KB
-
MD5
23e51fa32cd82c6c4b38e6c4b69719fb
-
SHA1
a4e50bf4379260c9a51d264b9ade01ec551e3847
-
SHA256
f70cbc150d38fcc49d90a937173b8163acb965d5a694bf339847c156491c8d3e
-
SHA512
78152a2dcbe015608987cb570c26beb8168025866b28158544427f30236a9dd50a536c01bb82a9fb02545ad1ede19aa5c56a2e8d8debf120a6500dbf1d7c7cbb
-
SSDEEP
3072:vYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////R:x0uXnWFchmmcI/o1//+pgw39
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-