General
-
Target
609b32adfefe0335329d641e591ca1ed_JaffaCakes118
-
Size
80KB
-
Sample
240520-xb9svsdb4z
-
MD5
609b32adfefe0335329d641e591ca1ed
-
SHA1
fcb99089f301a2e0c494519d0e21cf5b0f2d26b3
-
SHA256
dcd7feb1774d994996fb3822536bf6a65b183aec087c735cac707c666afb8b54
-
SHA512
1496bd1c73b89e207d84f766d1f9c3459df4973fae5e64633a58cf0f6215ea1a0641e7b4db3a4399d3af7a436fc324f8f80a46400a5f3c01a67a94bf61299e16
-
SSDEEP
768:1pJcaUitGAlmrJpmxlzC+w99NBy+1pjpmpX+nTAlLouQwe5+n4vTvy3L:1ptJlmrJpmxlRw99NBy+PaX+nOK44A
Behavioral task
behavioral1
Sample
609b32adfefe0335329d641e591ca1ed_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
609b32adfefe0335329d641e591ca1ed_JaffaCakes118.doc
Resource
win10v2004-20240426-en
Malware Config
Extracted
http://opendata.safuture.ca/94
http://autobritt.apptitude.ch/5XtLax
http://s3.techsysmedia-dz.com/SnQ
http://devground.zare.com/1aLfE7y
http://tania.ad99.it/VphwoU
Targets
-
-
Target
609b32adfefe0335329d641e591ca1ed_JaffaCakes118
-
Size
80KB
-
MD5
609b32adfefe0335329d641e591ca1ed
-
SHA1
fcb99089f301a2e0c494519d0e21cf5b0f2d26b3
-
SHA256
dcd7feb1774d994996fb3822536bf6a65b183aec087c735cac707c666afb8b54
-
SHA512
1496bd1c73b89e207d84f766d1f9c3459df4973fae5e64633a58cf0f6215ea1a0641e7b4db3a4399d3af7a436fc324f8f80a46400a5f3c01a67a94bf61299e16
-
SSDEEP
768:1pJcaUitGAlmrJpmxlzC+w99NBy+1pjpmpX+nTAlLouQwe5+n4vTvy3L:1ptJlmrJpmxlRw99NBy+PaX+nOK44A
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-