General
-
Target
9b59006f4fcfe00a50a7d40aff1a09c3_JaffaCakes118
-
Size
691KB
-
Sample
240610-t8j2xstgkk
-
MD5
9b59006f4fcfe00a50a7d40aff1a09c3
-
SHA1
38a48704c91102831f2fa21982950a2f3682da50
-
SHA256
b8cf0c0eb811ad88cb3210779047dc06e4ea32ba6cb48bbf14c15d6588821ade
-
SHA512
e389d2efe565d2ade409c133f7f9821aac96c6e89ba181bbfe5057885ec0eb120d599957905b38872ab2dfccdb5fc7afbf20a8db545eac3cdebf177b6ccb81b9
-
SSDEEP
3072:YkoI6HWpkoI6HWpkoI6HWpkoI6HWpkoI6HWA:Ydwdwdwdwd9
Static task
static1
Behavioral task
behavioral1
Sample
9b59006f4fcfe00a50a7d40aff1a09c3_JaffaCakes118.rtf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9b59006f4fcfe00a50a7d40aff1a09c3_JaffaCakes118.rtf
Resource
win10v2004-20240508-en
Malware Config
Extracted
http://lashawnbarber.com/images/files/okey.exe
http://www.iiswc.org/iiswc2009/sample.doc
Targets
-
-
Target
9b59006f4fcfe00a50a7d40aff1a09c3_JaffaCakes118
-
Size
691KB
-
MD5
9b59006f4fcfe00a50a7d40aff1a09c3
-
SHA1
38a48704c91102831f2fa21982950a2f3682da50
-
SHA256
b8cf0c0eb811ad88cb3210779047dc06e4ea32ba6cb48bbf14c15d6588821ade
-
SHA512
e389d2efe565d2ade409c133f7f9821aac96c6e89ba181bbfe5057885ec0eb120d599957905b38872ab2dfccdb5fc7afbf20a8db545eac3cdebf177b6ccb81b9
-
SSDEEP
3072:YkoI6HWpkoI6HWpkoI6HWpkoI6HWpkoI6HWA:Ydwdwdwdwd9
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-