General
-
Target
41b3a02254d5c22ff8522f42227c2106_JaffaCakes118
-
Size
191KB
-
Sample
240514-qznrzahg22
-
MD5
41b3a02254d5c22ff8522f42227c2106
-
SHA1
f4c18f2259be247fb039577d9c26dd65c12d5b84
-
SHA256
ccb79dda93025e923e331ed559dede37b9d588886ae7a227fddd3c5e439672ae
-
SHA512
c48ad20722a43c3d32ee90132ac19aaa087457628c56a44ae31a346dbdaf1568e3fe8753befe9dd2e7ad10a8fe15d4de616ec28ead66bda47f86148bc631393f
-
SSDEEP
1536:+rdi1Ir77zOH98Wj2gpng9+a93k1q9Dba/qrHEs+nPyNdOx7jed:+rfrzOH98ipgtva/qTX+nPyLOBad
Behavioral task
behavioral1
Sample
41b3a02254d5c22ff8522f42227c2106_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
41b3a02254d5c22ff8522f42227c2106_JaffaCakes118.doc
Resource
win10v2004-20240508-en
Malware Config
Extracted
http://zplusshopping.com/wp-content/plugins/8ek/
https://www.cupgel.com/__MACOSX/3/
http://freespiritmind.com/MASD/HowTo/css/J/
http://crewnecksusa.com/wp-content/NJ/
http://www.dougsuniverse.com/pics/yL8/
https://idilsoft.com/admin/B/
https://guhaasmart.com/wp-content/s/
Targets
-
-
Target
41b3a02254d5c22ff8522f42227c2106_JaffaCakes118
-
Size
191KB
-
MD5
41b3a02254d5c22ff8522f42227c2106
-
SHA1
f4c18f2259be247fb039577d9c26dd65c12d5b84
-
SHA256
ccb79dda93025e923e331ed559dede37b9d588886ae7a227fddd3c5e439672ae
-
SHA512
c48ad20722a43c3d32ee90132ac19aaa087457628c56a44ae31a346dbdaf1568e3fe8753befe9dd2e7ad10a8fe15d4de616ec28ead66bda47f86148bc631393f
-
SSDEEP
1536:+rdi1Ir77zOH98Wj2gpng9+a93k1q9Dba/qrHEs+nPyNdOx7jed:+rfrzOH98ipgtva/qTX+nPyLOBad
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-