General
-
Target
7b3e303a1ad77a40ebb99ecfcb66ae66_JaffaCakes118
-
Size
160KB
-
Sample
240528-bwzyhaag84
-
MD5
7b3e303a1ad77a40ebb99ecfcb66ae66
-
SHA1
c66d8e858bc6c46192c8cacd6f2553acdd385b5f
-
SHA256
ab30df9089d4f602e41259e086b183739d0b23bc88e239f2878809eab1772bf4
-
SHA512
b2e64989cfd474894d9b0f5dce638c05d6b2a4208ec9137ffffd1a17b620ae28a716e62603c474126eaf4a984e59d034627bfa96f8f6f0a54f3aaeeeefbbe086
-
SSDEEP
1536:8Ij9atFqpRIj9atFqpvrdi1Ir77zOH98Wj2gpngB+a9zTU3N7NSPuy:2rfrzOH98ipgbm7NSPb
Behavioral task
behavioral1
Sample
7b3e303a1ad77a40ebb99ecfcb66ae66_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7b3e303a1ad77a40ebb99ecfcb66ae66_JaffaCakes118.doc
Resource
win10v2004-20240426-en
Malware Config
Extracted
https://templatejson.com/awrrn/Kw10uo/
https://hosting.mybestheme.com/aikjj0q/8/
https://tastes2plate.com/wp-content/uploads/6/
http://madeirawildlife.com/wp-admin/zuWZW/
http://senyumdesa.org/wp-admin/aC4/
https://ibuyoldwebsites.com/modules/QVtEr7/
http://blog.zunapro.com/wp-admin/js/widgets/EH4agl/
Targets
-
-
Target
7b3e303a1ad77a40ebb99ecfcb66ae66_JaffaCakes118
-
Size
160KB
-
MD5
7b3e303a1ad77a40ebb99ecfcb66ae66
-
SHA1
c66d8e858bc6c46192c8cacd6f2553acdd385b5f
-
SHA256
ab30df9089d4f602e41259e086b183739d0b23bc88e239f2878809eab1772bf4
-
SHA512
b2e64989cfd474894d9b0f5dce638c05d6b2a4208ec9137ffffd1a17b620ae28a716e62603c474126eaf4a984e59d034627bfa96f8f6f0a54f3aaeeeefbbe086
-
SSDEEP
1536:8Ij9atFqpRIj9atFqpvrdi1Ir77zOH98Wj2gpngB+a9zTU3N7NSPuy:2rfrzOH98ipgbm7NSPb
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-