General
-
Target
a0c26a6c93b6dfdc81e4e4c1d3319c0a_JaffaCakes118
-
Size
143KB
-
Sample
240817-b759natejj
-
MD5
a0c26a6c93b6dfdc81e4e4c1d3319c0a
-
SHA1
7191d5ca8435d69cdfbccd9bad0a8472b076c135
-
SHA256
4893d5828613a7b157505151182a80ad894439fe4f65ebeb87fcf641880ca47a
-
SHA512
11fb21baa0633a4b2b97cb50aec203da2ba192f06f1a0e723b3d269b09ecc6b95cd30d4b8c3f43d921ee40b60e0486acb9fa5073b7bc0ddd9bcac913f16aee5e
-
SSDEEP
1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqbMxXOYgnJnIJe4SGOMKaK4/h:0R1qf69xak3MgxmqY0nae4sMKT6h
Static task
static1
Behavioral task
behavioral1
Sample
a0c26a6c93b6dfdc81e4e4c1d3319c0a_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a0c26a6c93b6dfdc81e4e4c1d3319c0a_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://ibccglobal.com/thankyou2/ARA/
http://work.digitalvichar.com/1mv7clu/o/
http://13.229.25.57/7xdfb/jpA/
http://binarystationary.com/cgi-bin/5rM/
http://fmcav.com/images/ZQF/
https://kodiakheating.com/ldnha/ybI/
https://khvs.vrfantasy.gallery/igiodbck/eXq/
Targets
-
-
Target
a0c26a6c93b6dfdc81e4e4c1d3319c0a_JaffaCakes118
-
Size
143KB
-
MD5
a0c26a6c93b6dfdc81e4e4c1d3319c0a
-
SHA1
7191d5ca8435d69cdfbccd9bad0a8472b076c135
-
SHA256
4893d5828613a7b157505151182a80ad894439fe4f65ebeb87fcf641880ca47a
-
SHA512
11fb21baa0633a4b2b97cb50aec203da2ba192f06f1a0e723b3d269b09ecc6b95cd30d4b8c3f43d921ee40b60e0486acb9fa5073b7bc0ddd9bcac913f16aee5e
-
SSDEEP
1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqbMxXOYgnJnIJe4SGOMKaK4/h:0R1qf69xak3MgxmqY0nae4sMKT6h
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-