General
-
Target
96b2db5c78b44df39dc9e5e9f0bc6d03_JaffaCakes118
-
Size
176KB
-
Sample
240605-abgqragf57
-
MD5
96b2db5c78b44df39dc9e5e9f0bc6d03
-
SHA1
60aac296a751c4ca26784bf09c13f0a1feb27b1a
-
SHA256
2111e686944a54f955abb3629f1c0ea08c05a3f1dd451181a8612dbcf4e25cc6
-
SHA512
2d736a43fef03d0fd51a72329c0e430a1c3d576f7cfee8ee08a1bf83112d1933a362f4371c4a65ecf51ffb5a558d00beee5a6cad5d8cd9dae506e44f6d4049fa
-
SSDEEP
1536:trdi1Ir77zOH98Wj2gpngx+a97GmLtHAL:trfrzOH98ipg/FAL
Behavioral task
behavioral1
Sample
96b2db5c78b44df39dc9e5e9f0bc6d03_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96b2db5c78b44df39dc9e5e9f0bc6d03_JaffaCakes118.doc
Resource
win10v2004-20240508-en
Malware Config
Extracted
https://haikouweixun.com/jn5/Rbp/
http://carolinacanullo.com/js/hllPT/
http://megasolucoesti.com/R9KDq0O8w/B3KqPpe/
http://www.insulution.org/wp-admin/swift/swift/y318LGM/
http://petafilm.com/calendar/6kOpwrt/
https://dev.contractdevs.co.uk/hbbny/Kv9/
http://blog.penmman.com/wp-content/uploads/1ECbn9K/
Targets
-
-
Target
96b2db5c78b44df39dc9e5e9f0bc6d03_JaffaCakes118
-
Size
176KB
-
MD5
96b2db5c78b44df39dc9e5e9f0bc6d03
-
SHA1
60aac296a751c4ca26784bf09c13f0a1feb27b1a
-
SHA256
2111e686944a54f955abb3629f1c0ea08c05a3f1dd451181a8612dbcf4e25cc6
-
SHA512
2d736a43fef03d0fd51a72329c0e430a1c3d576f7cfee8ee08a1bf83112d1933a362f4371c4a65ecf51ffb5a558d00beee5a6cad5d8cd9dae506e44f6d4049fa
-
SSDEEP
1536:trdi1Ir77zOH98Wj2gpngx+a97GmLtHAL:trfrzOH98ipg/FAL
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-