General
-
Target
3d948ebc3c54179fa48c0ccc6b493f0c_JaffaCakes118
-
Size
187KB
-
Sample
240514-c34eyaff7t
-
MD5
3d948ebc3c54179fa48c0ccc6b493f0c
-
SHA1
7f482d7f110062cb1eaefb1b861aeaa2e3b0d6d5
-
SHA256
074ec35c01d81a5e41e716a31b792840386f559d2be03411acfabd0a710b8362
-
SHA512
c26281e2aa238911ecb8c7fe4c22f854fc655d9d38e794ea42f9b8ab2b309467810de579ec8a81f5c3f804cc9f6b8d332074afc08e783b627c359590b3272ca6
-
SSDEEP
1536:tGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xildYXY9YgddT/Ephoj18sov8sCA8:zrfrzOH98ipgUekh
Behavioral task
behavioral1
Sample
3d948ebc3c54179fa48c0ccc6b493f0c_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3d948ebc3c54179fa48c0ccc6b493f0c_JaffaCakes118.doc
Resource
win10v2004-20240226-en
Malware Config
Extracted
https://scrappy.upsproutmedia.com/wp-admin/J/
https://china-specialist.com/wp-content/YrLG/
https://www.upsproutmedia.com/wp-admin/M/
http://pagearrow.com/wordpress/B/
http://a.xuezha.cn/lajop/OYdUzf/
http://blog.saadata.com/cgi-bin/vwz/
http://zeeamfashion.com/content/rqoL/
Targets
-
-
Target
3d948ebc3c54179fa48c0ccc6b493f0c_JaffaCakes118
-
Size
187KB
-
MD5
3d948ebc3c54179fa48c0ccc6b493f0c
-
SHA1
7f482d7f110062cb1eaefb1b861aeaa2e3b0d6d5
-
SHA256
074ec35c01d81a5e41e716a31b792840386f559d2be03411acfabd0a710b8362
-
SHA512
c26281e2aa238911ecb8c7fe4c22f854fc655d9d38e794ea42f9b8ab2b309467810de579ec8a81f5c3f804cc9f6b8d332074afc08e783b627c359590b3272ca6
-
SSDEEP
1536:tGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xildYXY9YgddT/Ephoj18sov8sCA8:zrfrzOH98ipgUekh
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-