General
-
Target
694ccbbf720ce4698640a6ff40e2c8f4_JaffaCakes118
-
Size
175KB
-
Sample
240523-byafmagh97
-
MD5
694ccbbf720ce4698640a6ff40e2c8f4
-
SHA1
e60be93093cac1b75dd806c5798c5fc80b8c9353
-
SHA256
3e95ef738095e4be4c467124e37a4dd934869e1ab1cb93105d38ca79b589350a
-
SHA512
fd8edf99ede986689edf0a3bd33434ed3686fd6d48b3877a0c9dbf6ad6afb49f95ea31ef2387ed133480b1b2fe4b0c0189f5b28e27c0e8e8ee843b80591d9f7b
-
SSDEEP
3072:O9ufstRUUKSns8T00JSHUgteMJ8qMD7gTDBBGB4c:O9ufsfgIf0pL/BBGB4c
Static task
static1
Behavioral task
behavioral1
Sample
694ccbbf720ce4698640a6ff40e2c8f4_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
694ccbbf720ce4698640a6ff40e2c8f4_JaffaCakes118.doc
Resource
win10v2004-20240508-en
Malware Config
Extracted
http://bonyanet.com/wp-admin/iR/
http://ofoghzagros.com/wp-admin/H/
https://ilinknepal.com/infosysnepal.com/Zdz/
https://storypostar.com/wp-admin/j/
https://www.pixelstoryteller.com/hydroplane-definition/wzb/
https://redchillicrackers.com/wp-content/p/
http://www.co-traveling.com/cgi-bin/003/
Targets
-
-
Target
694ccbbf720ce4698640a6ff40e2c8f4_JaffaCakes118
-
Size
175KB
-
MD5
694ccbbf720ce4698640a6ff40e2c8f4
-
SHA1
e60be93093cac1b75dd806c5798c5fc80b8c9353
-
SHA256
3e95ef738095e4be4c467124e37a4dd934869e1ab1cb93105d38ca79b589350a
-
SHA512
fd8edf99ede986689edf0a3bd33434ed3686fd6d48b3877a0c9dbf6ad6afb49f95ea31ef2387ed133480b1b2fe4b0c0189f5b28e27c0e8e8ee843b80591d9f7b
-
SSDEEP
3072:O9ufstRUUKSns8T00JSHUgteMJ8qMD7gTDBBGB4c:O9ufsfgIf0pL/BBGB4c
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-