General
-
Target
7a9e6a6856ea114f430d45a140945744_JaffaCakes118
-
Size
191KB
-
Sample
240527-1hfp5sah9y
-
MD5
7a9e6a6856ea114f430d45a140945744
-
SHA1
9c82025c13e05c6c811f64ff8a75304475ac379f
-
SHA256
7744f5715a96dc3c30dfb9adce7f8efb5f4d75b82e2451503bd5db8f11d80402
-
SHA512
67589fe3266c5594adfd99766a1f31bae134f34cd78d09238e60e1e99bc8b908f8b6d8100e3d5851e63352bd028e6fef481a81e8123b95d0eb50f5a0c8e7cbd0
-
SSDEEP
3072:i9ufstRUUKSns8T00JSHUgteMJ8qMD7gjN0zKNf9cfmfE7qdmVJKk/Juvc5a8a8b:i9ufsfgIf0pLWKby
Static task
static1
Behavioral task
behavioral1
Sample
7a9e6a6856ea114f430d45a140945744_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a9e6a6856ea114f430d45a140945744_JaffaCakes118.doc
Resource
win10v2004-20240426-en
Malware Config
Extracted
http://reklamdasiniz.com/wp-admin/W/
http://www.paramedicaleducationguidelines.com/wp-admin/7S/
http://bimasoftcbt.maannajahjakarta.com/wp-admin/i3K/
http://casualhome.com/wp-admin/Y/
https://aemine.vn/wp-admin/KMq/
http://aahnaturals.net/wp-includes/A3/
https://sbsec.org/bsadmin-portal/1nf/
Targets
-
-
Target
7a9e6a6856ea114f430d45a140945744_JaffaCakes118
-
Size
191KB
-
MD5
7a9e6a6856ea114f430d45a140945744
-
SHA1
9c82025c13e05c6c811f64ff8a75304475ac379f
-
SHA256
7744f5715a96dc3c30dfb9adce7f8efb5f4d75b82e2451503bd5db8f11d80402
-
SHA512
67589fe3266c5594adfd99766a1f31bae134f34cd78d09238e60e1e99bc8b908f8b6d8100e3d5851e63352bd028e6fef481a81e8123b95d0eb50f5a0c8e7cbd0
-
SSDEEP
3072:i9ufstRUUKSns8T00JSHUgteMJ8qMD7gjN0zKNf9cfmfE7qdmVJKk/Juvc5a8a8b:i9ufsfgIf0pLWKby
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-