General
-
Target
92a263d42588a24629d98aa5527e5402_JaffaCakes118
-
Size
201KB
-
Sample
240603-v7qzhsfb23
-
MD5
92a263d42588a24629d98aa5527e5402
-
SHA1
9693dab1efede5ed922d33bd2830db3002ab6d71
-
SHA256
f378d52ca240609ddf42cfd7fe5f3c83ed70ce0e560a3e669e0e8c229a9c1f28
-
SHA512
28ffbce82c61cf9d53266a48d65288f1950948dabd3aa89e735ddce0fbfdb1acef7ff169dcfa77408e8b564f365cac27c381203fc625026c45fda809dcf4a920
-
SSDEEP
3072:E4PrXcuQuvpzm4bkiaMQgAlS6TisQKz3wGB/TOk/ziEw01:ZDRv1m4bnQgISM/3wGB/TOk+Ew01
Behavioral task
behavioral1
Sample
92a263d42588a24629d98aa5527e5402_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
92a263d42588a24629d98aa5527e5402_JaffaCakes118.doc
Resource
win10v2004-20240426-en
Malware Config
Extracted
http://cahayu.id/wp-includes/jSi7Fd1r2wtg64969/
https://anhung1102.vn/wp-admin/LtirUcNdN/
https://idan-online.co.il/wp-admin/PPf124q2l26832/
http://www.canfrec.com.mx/4swBvrmkkp/VqcoomQpd/
http://dhartiproject.mysquare.in/temp/ZJd8p5u49737132/
https://lokeshullamkecskemet.hu/mail/Jnilw/
http://armonimalatya.com/dermatomic/77qo1g74024/
Targets
-
-
Target
92a263d42588a24629d98aa5527e5402_JaffaCakes118
-
Size
201KB
-
MD5
92a263d42588a24629d98aa5527e5402
-
SHA1
9693dab1efede5ed922d33bd2830db3002ab6d71
-
SHA256
f378d52ca240609ddf42cfd7fe5f3c83ed70ce0e560a3e669e0e8c229a9c1f28
-
SHA512
28ffbce82c61cf9d53266a48d65288f1950948dabd3aa89e735ddce0fbfdb1acef7ff169dcfa77408e8b564f365cac27c381203fc625026c45fda809dcf4a920
-
SSDEEP
3072:E4PrXcuQuvpzm4bkiaMQgAlS6TisQKz3wGB/TOk/ziEw01:ZDRv1m4bnQgISM/3wGB/TOk+Ew01
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-