General
-
Target
882e61c8d57836bb95f28070d0808b1e_JaffaCakes118
-
Size
171KB
-
Sample
240810-3yxdyaygpf
-
MD5
882e61c8d57836bb95f28070d0808b1e
-
SHA1
02230565a5c506913d6f3fd139d3cac7bf69761c
-
SHA256
1d2f06cbed29c06113fd84cc5a4db4be24346887afa63d85909dd60882a38336
-
SHA512
836c8a2a0557b6f759082b08e4d127eb6cf364bbc9115f56245c5618a0eae63441334927b5884bc0951d2956f77dedc23572bea7560bc3a06a7e1a675d04f786
-
SSDEEP
1536:sB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5Z+a9aWvrCv3Pt6DAP:s22TWTogk079THcpOu5UZFvw3Pt6DAP
Static task
static1
Behavioral task
behavioral1
Sample
882e61c8d57836bb95f28070d0808b1e_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
882e61c8d57836bb95f28070d0808b1e_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://ckinterbiz.com/backup/waI0rNy/
http://creationskateboards.com/shred/xnYp2/
http://bnmintl.com/cgi-bin/hQuB2/
http://buildingrobots.net/cgi-bin/LKgv/
http://booksearch.com/index_files/U/
http://davehale.ca/cgi-bin/v4kax/
https://www.equiposjj.com/cgi-bin/h0MId/
Targets
-
-
Target
882e61c8d57836bb95f28070d0808b1e_JaffaCakes118
-
Size
171KB
-
MD5
882e61c8d57836bb95f28070d0808b1e
-
SHA1
02230565a5c506913d6f3fd139d3cac7bf69761c
-
SHA256
1d2f06cbed29c06113fd84cc5a4db4be24346887afa63d85909dd60882a38336
-
SHA512
836c8a2a0557b6f759082b08e4d127eb6cf364bbc9115f56245c5618a0eae63441334927b5884bc0951d2956f77dedc23572bea7560bc3a06a7e1a675d04f786
-
SSDEEP
1536:sB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5Z+a9aWvrCv3Pt6DAP:s22TWTogk079THcpOu5UZFvw3Pt6DAP
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-