General
-
Target
821250bf34099b07ba82635ca9091e00_JaffaCakes118
-
Size
142KB
-
Sample
240801-2zmqfs1ejl
-
MD5
821250bf34099b07ba82635ca9091e00
-
SHA1
3aa7394e696cde485a859ea44d9ea50dc72cdfb1
-
SHA256
e2f0ddc987ff0a9a79c926af6fdf767ec0c2c46220b5fc370d27a511567f0151
-
SHA512
0339f37445b8e7d2e26d1e4311b9a1d93796aa0b1b75cfd8b2f5aba8f6e067025b4ee2b2a2ca0af5bf1e5d6c779f6ac14d0c4b6b8693041aab396dbc0808713a
-
SSDEEP
1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqbMxXOYgnJnIJe4SGOMKaK4/j:0R1qf69xak3Mgxm+Y0nae4sMKT6j
Static task
static1
Behavioral task
behavioral1
Sample
821250bf34099b07ba82635ca9091e00_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
821250bf34099b07ba82635ca9091e00_JaffaCakes118.doc
Resource
win10v2004-20240730-en
Malware Config
Extracted
http://ibccglobal.com/thankyou2/ARA/
http://work.digitalvichar.com/1mv7clu/o/
http://13.229.25.57/7xdfb/jpA/
http://binarystationary.com/cgi-bin/5rM/
http://fmcav.com/images/ZQF/
https://kodiakheating.com/ldnha/ybI/
https://khvs.vrfantasy.gallery/igiodbck/eXq/
Targets
-
-
Target
821250bf34099b07ba82635ca9091e00_JaffaCakes118
-
Size
142KB
-
MD5
821250bf34099b07ba82635ca9091e00
-
SHA1
3aa7394e696cde485a859ea44d9ea50dc72cdfb1
-
SHA256
e2f0ddc987ff0a9a79c926af6fdf767ec0c2c46220b5fc370d27a511567f0151
-
SHA512
0339f37445b8e7d2e26d1e4311b9a1d93796aa0b1b75cfd8b2f5aba8f6e067025b4ee2b2a2ca0af5bf1e5d6c779f6ac14d0c4b6b8693041aab396dbc0808713a
-
SSDEEP
1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqbMxXOYgnJnIJe4SGOMKaK4/j:0R1qf69xak3Mgxm+Y0nae4sMKT6j
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-