General
-
Target
b362a32aec816caf5fe07eb4b1de9be0_JaffaCakes118
-
Size
243KB
-
Sample
240616-n4vpzascpe
-
MD5
b362a32aec816caf5fe07eb4b1de9be0
-
SHA1
fea765fc84fec6bd07f61b81305cdff0dbbe08f7
-
SHA256
0b682badc7ff5224c955f8f117246513eaff6f331e94cc39d8278818508f4b69
-
SHA512
aaab7b6c4c4c822d5425a3a6195d9470879771441327828a1b539da057b8d0dbffe1bf34c52c77b0c4935515099782fc7d7aad4dbf7225c98c87dccf777b09de
-
SSDEEP
3072:lj6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGk++BsyFu+PxwKv/M:lHgtEWPsL/aTyT9Gk9qyNPxwKs
Behavioral task
behavioral1
Sample
b362a32aec816caf5fe07eb4b1de9be0_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b362a32aec816caf5fe07eb4b1de9be0_JaffaCakes118.doc
Resource
win10v2004-20240226-en
Malware Config
Extracted
http://thuening.de/cgi-bin/uo9wm/
http://portugalmypassion.com/wp-content/gJWA/
http://colegiolaesperanza.cl/new_img/fuJUk/
http://neuromedicaltechnology.com/cgi-bin/SkB/
http://sensesgo.com/e9x8b82yg/y651K/
http://theonpassive.com/wp-admin/A3/
http://www.feetinform.de/localization/n7g/
Targets
-
-
Target
b362a32aec816caf5fe07eb4b1de9be0_JaffaCakes118
-
Size
243KB
-
MD5
b362a32aec816caf5fe07eb4b1de9be0
-
SHA1
fea765fc84fec6bd07f61b81305cdff0dbbe08f7
-
SHA256
0b682badc7ff5224c955f8f117246513eaff6f331e94cc39d8278818508f4b69
-
SHA512
aaab7b6c4c4c822d5425a3a6195d9470879771441327828a1b539da057b8d0dbffe1bf34c52c77b0c4935515099782fc7d7aad4dbf7225c98c87dccf777b09de
-
SSDEEP
3072:lj6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGk++BsyFu+PxwKv/M:lHgtEWPsL/aTyT9Gk9qyNPxwKs
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-