General
-
Target
ad44ab8315d5076c5bd27e3712621aab_JaffaCakes118
-
Size
143KB
-
Sample
240820-a7j6raygnk
-
MD5
ad44ab8315d5076c5bd27e3712621aab
-
SHA1
973351a36591f641dc4a3b62b1ecbbad08b024da
-
SHA256
dc939640b203aebb656969e5657972216e1c314c2a621e1767747f2e73cd5f19
-
SHA512
93dbdcdb0ea2b29bba532535bf0451ce0f6214e1424103d175414ce706280d9413b92479eef1414622e1b0428076aaf4c8db58d9e62c78f1861ddc4deb506ffb
-
SSDEEP
1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqXMxXOYgnJnIJe4SGOMKaK4/z:0R1qf69xak3Mgxm+Y0nae4sMKT6z
Static task
static1
Behavioral task
behavioral1
Sample
ad44ab8315d5076c5bd27e3712621aab_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad44ab8315d5076c5bd27e3712621aab_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://ibccglobal.com/thankyou2/ARA/
http://work.digitalvichar.com/1mv7clu/o/
http://13.229.25.57/7xdfb/jpA/
http://binarystationary.com/cgi-bin/5rM/
http://fmcav.com/images/ZQF/
https://kodiakheating.com/ldnha/ybI/
https://khvs.vrfantasy.gallery/igiodbck/eXq/
Targets
-
-
Target
ad44ab8315d5076c5bd27e3712621aab_JaffaCakes118
-
Size
143KB
-
MD5
ad44ab8315d5076c5bd27e3712621aab
-
SHA1
973351a36591f641dc4a3b62b1ecbbad08b024da
-
SHA256
dc939640b203aebb656969e5657972216e1c314c2a621e1767747f2e73cd5f19
-
SHA512
93dbdcdb0ea2b29bba532535bf0451ce0f6214e1424103d175414ce706280d9413b92479eef1414622e1b0428076aaf4c8db58d9e62c78f1861ddc4deb506ffb
-
SSDEEP
1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqXMxXOYgnJnIJe4SGOMKaK4/z:0R1qf69xak3Mgxm+Y0nae4sMKT6z
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-