General
-
Target
390f877688273a8c2cc420cb48a97cb1_JaffaCakes118
-
Size
105KB
-
Sample
240711-pcwcvsyanh
-
MD5
390f877688273a8c2cc420cb48a97cb1
-
SHA1
054958d50815805d677097275d994d46039037a3
-
SHA256
60daac95bcce2b3021bb614a8fff918ac978e2f86e11ccaf9e8e50a1273f8d72
-
SHA512
53590c18b845627a460887fca4869d6e9566312d6aa73de7543defc6d2fc30198e15e759e4bdf73c8ead2120657eca2be9faf9dcad57367a011384096435807d
-
SSDEEP
3072:WcPiTQAVW/89BQnmlcGvgZ6Gr3J8YUOMqt/BI/s/C/i/R/7/3/UQ/OhP/2/a/1/A:WcPiTQAVW/89BQnmlcGvgZ7r3J8YUOMG
Behavioral task
behavioral1
Sample
390f877688273a8c2cc420cb48a97cb1_JaffaCakes118.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
390f877688273a8c2cc420cb48a97cb1_JaffaCakes118.xls
Resource
win10v2004-20240704-en
Malware Config
Extracted
http://wordpress.nightingale.com/overview_user_2/nrjxvwss/4818840.dat
http://www.anticasting.in/admin/lib/font-awesome/css/csjzie/4818840.dat
http://www.laurietalbothall.com/wp-includes/SimplePie/Cache/nxkuckvdc/4818840.dat
http://balmoraldevelopment.ca/zulrah-inventory-njbqt/cjeehroals/4818840.dat
http://www.sinsenos3.info/wp-content/themes/Newsmag/nhhyypc/4818840.dat
Targets
-
-
Target
390f877688273a8c2cc420cb48a97cb1_JaffaCakes118
-
Size
105KB
-
MD5
390f877688273a8c2cc420cb48a97cb1
-
SHA1
054958d50815805d677097275d994d46039037a3
-
SHA256
60daac95bcce2b3021bb614a8fff918ac978e2f86e11ccaf9e8e50a1273f8d72
-
SHA512
53590c18b845627a460887fca4869d6e9566312d6aa73de7543defc6d2fc30198e15e759e4bdf73c8ead2120657eca2be9faf9dcad57367a011384096435807d
-
SSDEEP
3072:WcPiTQAVW/89BQnmlcGvgZ6Gr3J8YUOMqt/BI/s/C/i/R/7/3/UQ/OhP/2/a/1/A:WcPiTQAVW/89BQnmlcGvgZ7r3J8YUOMG
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-