General
-
Target
a1f6ffce98b7ec20b576013586c59f2d_JaffaCakes118
-
Size
173KB
-
Sample
240612-x3qjaswhrf
-
MD5
a1f6ffce98b7ec20b576013586c59f2d
-
SHA1
f98866640f9a2784a518b476f45297648fbece8b
-
SHA256
76c43618ef9d37e74fc07de291c5e0762aabad08ebfcf56a199a96c85d765c83
-
SHA512
5b77ed46f2bd3370f79f670eabd3e0b9f909b2f4aad8dcda21f3c35e87e7b370857cf1a46b7db394761be7c03e509c4612ce34dc6785dca5abd6ee18c1c8d441
-
SSDEEP
1536:erdi1Ir77zOH98Wj2gpngR+a9FpxO8nq78ct2PU7MXKSSxH5pcKaJnr7y2v:erfrzOH98ipgokBr7n
Behavioral task
behavioral1
Sample
a1f6ffce98b7ec20b576013586c59f2d_JaffaCakes118.doc
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a1f6ffce98b7ec20b576013586c59f2d_JaffaCakes118.doc
Resource
win10v2004-20240508-en
Malware Config
Extracted
http://rhyton-building.com/wp-admin/Ey8qV0/
http://ezzll.com/wp-includes/KIU2WU/
http://tellmetech.com/wp-content/4ka/
https://elmundodelareposteria.com/wp-admin/0PVVmJm/
https://manuelrozas.cl/assets/XWN/
https://haritdharni.com/wp-admin/bZM/
https://theworks-group.com/site/pQT6j5/
Targets
-
-
Target
a1f6ffce98b7ec20b576013586c59f2d_JaffaCakes118
-
Size
173KB
-
MD5
a1f6ffce98b7ec20b576013586c59f2d
-
SHA1
f98866640f9a2784a518b476f45297648fbece8b
-
SHA256
76c43618ef9d37e74fc07de291c5e0762aabad08ebfcf56a199a96c85d765c83
-
SHA512
5b77ed46f2bd3370f79f670eabd3e0b9f909b2f4aad8dcda21f3c35e87e7b370857cf1a46b7db394761be7c03e509c4612ce34dc6785dca5abd6ee18c1c8d441
-
SSDEEP
1536:erdi1Ir77zOH98Wj2gpngR+a9FpxO8nq78ct2PU7MXKSSxH5pcKaJnr7y2v:erfrzOH98ipgokBr7n
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-