General
-
Target
862a0a60886bc432c39c9438727be51d_JaffaCakes118
-
Size
157KB
-
Sample
240531-grk7fahd2z
-
MD5
862a0a60886bc432c39c9438727be51d
-
SHA1
c0a3979f1d1e423b6f9982c14ed861ff486093e0
-
SHA256
933b3518041b978efa6f14e957c5a72dbd62b3e460129c2eb6904ba09c1b8f17
-
SHA512
c6faad0e04ea1084d8ef0f5297b28f4685f284b15fdba08ee1a106f18467cf2d01af08fc83877f3a4cc721bcc7b21fb7c39046ffc3244e75b0c0a359e1081824
-
SSDEEP
1536:A2Fj72Fjmrdi1Ir77zOH98Wj2gpngh+a9vlJiOP:1rfrzOH98ipgpYOP
Behavioral task
behavioral1
Sample
862a0a60886bc432c39c9438727be51d_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
862a0a60886bc432c39c9438727be51d_JaffaCakes118.doc
Resource
win10v2004-20240508-en
Malware Config
Extracted
https://case.gonukkad.com/sys-cache/CjT/
https://starrcoin.net/wp-admin/YT/
http://modelaw.devkind.com.au/wp-admin/cvDRmGK/
http://dprkp.palembang.go.id/sys-cache/7Y4aHw/
http://completeguideblogging.com/euiot/PAuJG/
http://qutiche.cn/wp-admin/Q/
https://shiva-engineering.com/1cj/tKemHV7/
Targets
-
-
Target
862a0a60886bc432c39c9438727be51d_JaffaCakes118
-
Size
157KB
-
MD5
862a0a60886bc432c39c9438727be51d
-
SHA1
c0a3979f1d1e423b6f9982c14ed861ff486093e0
-
SHA256
933b3518041b978efa6f14e957c5a72dbd62b3e460129c2eb6904ba09c1b8f17
-
SHA512
c6faad0e04ea1084d8ef0f5297b28f4685f284b15fdba08ee1a106f18467cf2d01af08fc83877f3a4cc721bcc7b21fb7c39046ffc3244e75b0c0a359e1081824
-
SSDEEP
1536:A2Fj72Fjmrdi1Ir77zOH98Wj2gpngh+a9vlJiOP:1rfrzOH98ipgpYOP
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-