General
-
Target
88fce4d1e2aa2f410f858e46cbad8b98_JaffaCakes118
-
Size
152KB
-
Sample
240811-e29lnsygph
-
MD5
88fce4d1e2aa2f410f858e46cbad8b98
-
SHA1
7096d89bb0a29500aeb390237f8d0d1a7c1ddc2b
-
SHA256
0b102ec43b4bf3d7459491664e5c2f731286d92134e87e00967a144e59c28ad0
-
SHA512
26bb408bc03c5914c559c6eb3b5b18994b46226d55144fe70892a4b3c2e5559a52e653faca85aa328ca87c051ddd780d673e7479438a271142dab289b3a5e4d0
-
SSDEEP
1536:hAkT3yRFGEv0QtKPaOtMPAquK1gLadmpsHkkyeY+tB445TEgrO3jSWAg83tle1ZP:022TWTogk079THcpOu5UZ+aEuV
Static task
static1
Behavioral task
behavioral1
Sample
88fce4d1e2aa2f410f858e46cbad8b98_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
88fce4d1e2aa2f410f858e46cbad8b98_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://www.firhajshoes.com/wp-admin/RgaiT/
http://fakeread.com/OneSignal-Web-SDK-HTTPS-Integration-Files/Wf/
http://www.rttutoring.com/wp-includes/LlbY6o/
http://blueskysol.com/sys-cache/2Rk/
http://crazyboxs.com/cgi-bin/IaJ/
http://www.paramedicaleducationguidelines.com/wp-admin/3jXU5Bp/
http://nuhatoys.com/wp-admin/WWA4R/
Targets
-
-
Target
88fce4d1e2aa2f410f858e46cbad8b98_JaffaCakes118
-
Size
152KB
-
MD5
88fce4d1e2aa2f410f858e46cbad8b98
-
SHA1
7096d89bb0a29500aeb390237f8d0d1a7c1ddc2b
-
SHA256
0b102ec43b4bf3d7459491664e5c2f731286d92134e87e00967a144e59c28ad0
-
SHA512
26bb408bc03c5914c559c6eb3b5b18994b46226d55144fe70892a4b3c2e5559a52e653faca85aa328ca87c051ddd780d673e7479438a271142dab289b3a5e4d0
-
SSDEEP
1536:hAkT3yRFGEv0QtKPaOtMPAquK1gLadmpsHkkyeY+tB445TEgrO3jSWAg83tle1ZP:022TWTogk079THcpOu5UZ+aEuV
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-