General
-
Target
659add061c8bc28177202ec8b7b5e247_JaffaCakes118
-
Size
160KB
-
Sample
240522-cc17wsgf87
-
MD5
659add061c8bc28177202ec8b7b5e247
-
SHA1
be6353470a0f663b035118644271ecf3615ab767
-
SHA256
2bbcef2cf92b3592e44ed056a95dc42021e3699c56c8126144934a4b10fd2a2b
-
SHA512
05bce337c7d35a6903b4f70fec8a92ae299b58349456885d3d5aef6174c267d5144f8f701ea34218f4acc056e4e158f7804849b22036e96a3a71743889b96675
-
SSDEEP
1536:8Ij9atFqpRIj9atFqpvrdi1Ir77zOH98Wj2gpngB+a9z5U3N7NS7uS:2rfrzOH98ipgBm7NS7r
Behavioral task
behavioral1
Sample
659add061c8bc28177202ec8b7b5e247_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
659add061c8bc28177202ec8b7b5e247_JaffaCakes118.doc
Resource
win10v2004-20240426-en
Malware Config
Extracted
https://templatejson.com/awrrn/Kw10uo/
https://hosting.mybestheme.com/aikjj0q/8/
https://tastes2plate.com/wp-content/uploads/6/
http://madeirawildlife.com/wp-admin/zuWZW/
http://senyumdesa.org/wp-admin/aC4/
https://ibuyoldwebsites.com/modules/QVtEr7/
http://blog.zunapro.com/wp-admin/js/widgets/EH4agl/
Targets
-
-
Target
659add061c8bc28177202ec8b7b5e247_JaffaCakes118
-
Size
160KB
-
MD5
659add061c8bc28177202ec8b7b5e247
-
SHA1
be6353470a0f663b035118644271ecf3615ab767
-
SHA256
2bbcef2cf92b3592e44ed056a95dc42021e3699c56c8126144934a4b10fd2a2b
-
SHA512
05bce337c7d35a6903b4f70fec8a92ae299b58349456885d3d5aef6174c267d5144f8f701ea34218f4acc056e4e158f7804849b22036e96a3a71743889b96675
-
SSDEEP
1536:8Ij9atFqpRIj9atFqpvrdi1Ir77zOH98Wj2gpngB+a9z5U3N7NS7uS:2rfrzOH98ipgBm7NS7r
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-