General
-
Target
2d27a1f3eeec5fdca3ec80489a324150_JaffaCakes118
-
Size
244KB
-
Sample
240510-d8et7sca67
-
MD5
2d27a1f3eeec5fdca3ec80489a324150
-
SHA1
329238308b3d8bcc0f8b750e8f688c88f650fcee
-
SHA256
1d92ed98ab64c028fb00bdb1edb06bd48d9df3a1d6ed665a12bc85fffafc6841
-
SHA512
a4df8e22c54abd610b3b466011aad460f05968a99a6bddc2e119337179f67e3dcce625fb44691d438cabcbcb0d50b235773507f0121625ecb330968160d4820b
-
SSDEEP
3072:VUAA3WuH/S6AQn9cfhjcgBYfk1VOGCYGgktDkQktDSOJpDa:ePAsUlcKp1UGCYONnktbZa
Behavioral task
behavioral1
Sample
Inquiry.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Inquiry.doc
Resource
win10v2004-20240226-en
Malware Config
Extracted
http://jshdhqqusjakxmxla.com/MXE/lodpos.php?l=yets3.xt2
Targets
-
-
Target
Inquiry.doc
-
Size
161KB
-
MD5
025f26017dc70b1b0a14d9900473e5f0
-
SHA1
543eb170ca0251f1168859e52da41a196fd5efec
-
SHA256
970926dfba45666a0386f90da19a8c7b1d8e266fbb334de8b77442fe1faefca1
-
SHA512
774646424a1a79b404e3ba7ccd9bc88ae2f075acf95c0898161a29e676526f75eecf0c2ef7f80651cf6236fadeba793fb1c6062b74150cf8ad935891c6a12121
-
SSDEEP
3072:tte2dw99f0TYKn2OlbVS6BBbIVR5f76yzYB8:vHdw7OYK2Oiy2VR5f76t8
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-