General
-
Target
786e98405e3e209c53db41fc4ac8f4ed_JaffaCakes118
-
Size
91KB
-
Sample
240527-jtmt6aea56
-
MD5
786e98405e3e209c53db41fc4ac8f4ed
-
SHA1
f963a0b4087c1ee3f975c01f441cd1ee9ac83dcc
-
SHA256
f7e897dbcc63afcaec957700ab091ce9ae06e9880d84bf4f81c47349b38a41b4
-
SHA512
55aa568111ff8be16e8f77f2270ea9dae5618b74bb7534a3c6e9dbcaee44dc87ccdf4900f5b4d2274a603f0ac842606ead270589762aa517bb08f1af6cc3acbd
-
SSDEEP
768:TgXpKz793WsKqOkWsKJ09bPYaOOaKCjsZoKZpKzlq1WsKJw1qraqQ+1cecm87WD0:2C93W2WR0IKCjcn1WQqQ+eWDSTtU
Static task
static1
Behavioral task
behavioral1
Sample
I_427574.docx
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
I_427574.docx
Resource
win10v2004-20240426-en
Malware Config
Extracted
http://alexandradickman.com/KJHDhbje71
Targets
-
-
Target
I_427574.doc
-
Size
13KB
-
MD5
1cb9a32af5b30aa26d6198c8b5c46168
-
SHA1
53c715d90ba6eccbfde4d231c5f1c0280835c514
-
SHA256
ea132c34ebbc591eda78531e2bfb9a4cb40e55a245191f54e82df25be9b58db2
-
SHA512
2856d1f6b7a7768d1695c515d760780357f7e4fddb7a07416ef4fa7a89c5556086830ebe6db7910a788ed5cd3c11db6d75d46bdc80a4875ded589391a8886d7e
-
SSDEEP
192:CtNCNMf8obL6bj9zJCvLecm8hhL46G0o2M8Uvnp3GlWZmTOeKfR6:aNSQmx1CTecm87XG0ogUh/UTtKfR6
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-