General
-
Target
443ae95c2c1e9323ba8ed84249fa07f1_JaffaCakes118
-
Size
230KB
-
Sample
240515-c9cwkaea23
-
MD5
443ae95c2c1e9323ba8ed84249fa07f1
-
SHA1
7f063c638a3b4819d4843619f73b3910d64be552
-
SHA256
39d26726f643a3ca157d4d7e78f10831854f191120a06b95e0ed413fd0170d4f
-
SHA512
73a2d7898ccb3fa31acfc0872c0753fbffcd4af7a0bc012431d47696bf36f32abf68d0c2212ddff8474cd195865cc8f9417a94190e2654fa0e1e9001c184d45a
-
SSDEEP
3072:QvrNNpClULzo5DIzUmcQC8jL/xSu90OoiLuDKZXfwKeljR1v:6tZ7jcQCKxUOmD+XfwLj
Static task
static1
Behavioral task
behavioral1
Sample
443ae95c2c1e9323ba8ed84249fa07f1_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
443ae95c2c1e9323ba8ed84249fa07f1_JaffaCakes118.doc
Resource
win10v2004-20240426-en
Malware Config
Extracted
http://sarahleighroddis.com/xZs22v11
http://fbroz.com/COeg4ZZ
http://thesunavenuequan2.com/UYUiGwf9j
http://drapart.org/Jvn89HTd2O
http://ikiw.iniqua.com/oO0OtJVo
Targets
-
-
Target
443ae95c2c1e9323ba8ed84249fa07f1_JaffaCakes118
-
Size
230KB
-
MD5
443ae95c2c1e9323ba8ed84249fa07f1
-
SHA1
7f063c638a3b4819d4843619f73b3910d64be552
-
SHA256
39d26726f643a3ca157d4d7e78f10831854f191120a06b95e0ed413fd0170d4f
-
SHA512
73a2d7898ccb3fa31acfc0872c0753fbffcd4af7a0bc012431d47696bf36f32abf68d0c2212ddff8474cd195865cc8f9417a94190e2654fa0e1e9001c184d45a
-
SSDEEP
3072:QvrNNpClULzo5DIzUmcQC8jL/xSu90OoiLuDKZXfwKeljR1v:6tZ7jcQCKxUOmD+XfwLj
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-