General
-
Target
8b0afc380c1acb7ae9d6c2dcf627980d_JaffaCakes118
-
Size
176KB
-
Sample
240811-tnlp1s1emh
-
MD5
8b0afc380c1acb7ae9d6c2dcf627980d
-
SHA1
d78034bd53f393ad233a35f0729caaf87485c9b0
-
SHA256
a1799209764bed652f49c9a7ae69f831ccd969f7376551302156c8a6b543394f
-
SHA512
cb6fe015520e792d82b854a1453f2751eb30ec9f14e487f7c63c3fb1db5bc1d24d7c74e4a427585c7cf892362bfe46c3f6dae68df64ddde0b99364e73500c654
-
SSDEEP
1536:q5M8Na9quLeJ1b5VahG/A8k/gvjl0NZqDlGffQanLzdf7RqDYO4OvqTl1ygpdavB:SUqJ1NgsA8k/gvh0NZ0lGX1nZ7RKYu
Static task
static1
Behavioral task
behavioral1
Sample
8b0afc380c1acb7ae9d6c2dcf627980d_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8b0afc380c1acb7ae9d6c2dcf627980d_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://famousdiagnosticcenter.com/wp-admin/7wX/
http://www.govtcollegesihunta.com/wp-includes/hX/
http://jegsnet.com/wp-content/lPr/
http://fenekformalas.newquantumlogic.com/webstat/G/
http://helixity-india.com/wp-content/M/
https://www.buntebenelux.com/wp-admin/cbW/
http://swso2.com/wp-admin/a/
Targets
-
-
Target
8b0afc380c1acb7ae9d6c2dcf627980d_JaffaCakes118
-
Size
176KB
-
MD5
8b0afc380c1acb7ae9d6c2dcf627980d
-
SHA1
d78034bd53f393ad233a35f0729caaf87485c9b0
-
SHA256
a1799209764bed652f49c9a7ae69f831ccd969f7376551302156c8a6b543394f
-
SHA512
cb6fe015520e792d82b854a1453f2751eb30ec9f14e487f7c63c3fb1db5bc1d24d7c74e4a427585c7cf892362bfe46c3f6dae68df64ddde0b99364e73500c654
-
SSDEEP
1536:q5M8Na9quLeJ1b5VahG/A8k/gvjl0NZqDlGffQanLzdf7RqDYO4OvqTl1ygpdavB:SUqJ1NgsA8k/gvh0NZ0lGX1nZ7RKYu
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-