General
-
Target
6fe45f14b8979c44af50fb66d899dc17_JaffaCakes118
-
Size
857KB
-
Sample
240524-1nmewace34
-
MD5
6fe45f14b8979c44af50fb66d899dc17
-
SHA1
b373d5208689c21928d124df0bb2cef405f2f77e
-
SHA256
a8833208d6a934b15334a02ecaee6df9939786f469be1a8d3944a43a53571a43
-
SHA512
f6836a57d8a8ab7096807ab12c4d89c655796803911764576b66fb29e69309e7320f4908b93a2d24ff681475b9d676698b5f00d6abb4fb47c5b4b5f1aced142f
-
SSDEEP
12288:IXcp2r+s25xYf8Hb0oLAarHDaYdIZqUrz3s2aXcp2r7:IXcp2Cs25bvpdIv3s2aXcp2H
Static task
static1
Behavioral task
behavioral1
Sample
6fe45f14b8979c44af50fb66d899dc17_JaffaCakes118.rtf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6fe45f14b8979c44af50fb66d899dc17_JaffaCakes118.rtf
Resource
win10v2004-20240508-en
Malware Config
Extracted
formbook
3.8
ch57
langoloverdeselvino.com
sjt5mbd68t.com
gongshilicai.com
carteblanchestudios.com
bctechnicaltraining.com
shokuyo.net
topminde.com
harvardcs.net
ssc-8.com
apshangwei.com
piratedlife.com
caricata.com
xulingxianzhen.com
mtofilm.com
gfuzz.online
satanslibrary.com
wooloficeland.com
emilengler.com
gemvoid.com
magussbrasil.com
alohakoin.com
henandarun.com
club5288.net
annapolispower.com
wukongju.com
ainoniva.com
bibiz.restaurant
tedjohnsondesign.net
vietnailssupply.com
2nevadast.com
hnxbfj.com
springbootbook.com
yunfu998com.com
xn--koyx83c.ink
artistisa.com
kingstheatreheritage.com
gfc6ekyfd.biz
mywebgib.com
tv17777.info
fh9qg0f2t.win
tropicade.biz
thebucketlist.online
jerseysforstar.biz
noithatgoquocte.com
thenutmegpond.com
carolinecolbach.com
hotelparticulier-le28.com
kationscientific.net
urbandecayoffers.com
catoevents.com
brandingandstanding.com
filmswar.com
print191.com
christianvideos.faith
umiml.com
nfamosas-desnudas.review
hamiltongeotechnical.com
lifetimecooks.com
jedconsulting.biz
bkmmbp.info
pandaglace.com
countrydogs-boarding.com
homespundev.com
juris-creact.com
erimokate.com
Targets
-
-
Target
6fe45f14b8979c44af50fb66d899dc17_JaffaCakes118
-
Size
857KB
-
MD5
6fe45f14b8979c44af50fb66d899dc17
-
SHA1
b373d5208689c21928d124df0bb2cef405f2f77e
-
SHA256
a8833208d6a934b15334a02ecaee6df9939786f469be1a8d3944a43a53571a43
-
SHA512
f6836a57d8a8ab7096807ab12c4d89c655796803911764576b66fb29e69309e7320f4908b93a2d24ff681475b9d676698b5f00d6abb4fb47c5b4b5f1aced142f
-
SSDEEP
12288:IXcp2r+s25xYf8Hb0oLAarHDaYdIZqUrz3s2aXcp2r7:IXcp2Cs25bvpdIv3s2aXcp2H
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Formbook payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-