General
-
Target
326c887be59db807c0bdb1ea3e2844be_JaffaCakes118
-
Size
89KB
-
Sample
240511-dqt66sda26
-
MD5
326c887be59db807c0bdb1ea3e2844be
-
SHA1
22625177d5f095ad2a42ec8ed8afbbf779eae0cf
-
SHA256
d50195ad19f55e860a8080a09e80a8b960f41f95c5d87952b5f6eff401db5c75
-
SHA512
0997fd5afb55525ebcade983b1bff0000a76889af41c51be6311295acaeb6291dc089ac7aeadbb8500f88fafe1c6975dc89686b8cf5eaf72987f1fc4793bdb92
-
SSDEEP
1536:Yl0suyCPocn1kp59gxBK85fB7s+aM14E0/SO8Mkk:uu241k/W48cp
Behavioral task
behavioral1
Sample
326c887be59db807c0bdb1ea3e2844be_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
326c887be59db807c0bdb1ea3e2844be_JaffaCakes118.doc
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
326c887be59db807c0bdb1ea3e2844be_JaffaCakes118
-
Size
89KB
-
MD5
326c887be59db807c0bdb1ea3e2844be
-
SHA1
22625177d5f095ad2a42ec8ed8afbbf779eae0cf
-
SHA256
d50195ad19f55e860a8080a09e80a8b960f41f95c5d87952b5f6eff401db5c75
-
SHA512
0997fd5afb55525ebcade983b1bff0000a76889af41c51be6311295acaeb6291dc089ac7aeadbb8500f88fafe1c6975dc89686b8cf5eaf72987f1fc4793bdb92
-
SSDEEP
1536:Yl0suyCPocn1kp59gxBK85fB7s+aM14E0/SO8Mkk:uu241k/W48cp
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-