General
-
Target
3bd256704b8c3764143dbb14e77e6bde_JaffaCakes118
-
Size
199KB
-
Sample
240512-yny3kadg3w
-
MD5
3bd256704b8c3764143dbb14e77e6bde
-
SHA1
0d59f0e43c2e184eafa354fc3d930882b6223db7
-
SHA256
120089ff2f68e783b44f00f3f9679d71cf5c93c16a88de58c11e392458ba0090
-
SHA512
cf435f04cddeb5eb5acb21817c2e76949e488672feea6059d118f2d080719f3f9f59b9390472bc2a81e1829e16ba3db8969c55c3876477d4d8b414a1e0ce9734
-
SSDEEP
1536:04tcTv8kvjEuJ0dH5L0c4vs3ti18NmIIP4ovlnoR+a9Xig7ix5EvGtaWWfjPYKwN:04tcTvjvTY140818tIP4ovpvLmGhoI
Behavioral task
behavioral1
Sample
3bd256704b8c3764143dbb14e77e6bde_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3bd256704b8c3764143dbb14e77e6bde_JaffaCakes118.doc
Resource
win10v2004-20240508-en
Malware Config
Extracted
http://veccino56.com/gjpra/4ZR/
http://girlgeekdinners.com/wp-content/Hpz/
http://marblingmagpie.com/COPYRIGHT/Ak/
http://aplicativoipok.net/wp-includes/ONW/
http://ec2-52-56-233-157.eu-west-2.compute.amazonaws.com/wp-includes/35/
https://shd7.life/mlktv/r6/
https://www.hairlineunisexsalon.com/demo/UX/
Targets
-
-
Target
3bd256704b8c3764143dbb14e77e6bde_JaffaCakes118
-
Size
199KB
-
MD5
3bd256704b8c3764143dbb14e77e6bde
-
SHA1
0d59f0e43c2e184eafa354fc3d930882b6223db7
-
SHA256
120089ff2f68e783b44f00f3f9679d71cf5c93c16a88de58c11e392458ba0090
-
SHA512
cf435f04cddeb5eb5acb21817c2e76949e488672feea6059d118f2d080719f3f9f59b9390472bc2a81e1829e16ba3db8969c55c3876477d4d8b414a1e0ce9734
-
SSDEEP
1536:04tcTv8kvjEuJ0dH5L0c4vs3ti18NmIIP4ovlnoR+a9Xig7ix5EvGtaWWfjPYKwN:04tcTvjvTY140818tIP4ovpvLmGhoI
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-
Drops file in System32 directory
-