General
-
Target
afa78afb7e8f2f47d8fc0d308abfb0bb_JaffaCakes118
-
Size
26KB
-
Sample
240820-r7aqraxgqa
-
MD5
afa78afb7e8f2f47d8fc0d308abfb0bb
-
SHA1
1ef3a820447080a44f5bd96f7c94c9c8e6765d3c
-
SHA256
2c57cdeb1938688244dcaf05544e47daef28a6cec2866a674df9b6a4ed45237a
-
SHA512
ce160e93222bd5592c8f6c7ac666a734dee3f0c065721a886d6ae5492dbaf668ad48d0c2eafc0d57c93b46cb9ae53b9f3a74e5739ea8181e085ba8779ccd528a
-
SSDEEP
384:6d3gdaSUlM9z5BUSMUtiJ+gK+qD8qsuSvNtmPWbtqpq/9R9dhqujV6M:IIvxgAPh+kNSaPWp5VR9WI
Behavioral task
behavioral1
Sample
afa78afb7e8f2f47d8fc0d308abfb0bb_JaffaCakes118.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afa78afb7e8f2f47d8fc0d308abfb0bb_JaffaCakes118.xlsm
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://en.ioho.me/u87o11.txt
Targets
-
-
Target
afa78afb7e8f2f47d8fc0d308abfb0bb_JaffaCakes118
-
Size
26KB
-
MD5
afa78afb7e8f2f47d8fc0d308abfb0bb
-
SHA1
1ef3a820447080a44f5bd96f7c94c9c8e6765d3c
-
SHA256
2c57cdeb1938688244dcaf05544e47daef28a6cec2866a674df9b6a4ed45237a
-
SHA512
ce160e93222bd5592c8f6c7ac666a734dee3f0c065721a886d6ae5492dbaf668ad48d0c2eafc0d57c93b46cb9ae53b9f3a74e5739ea8181e085ba8779ccd528a
-
SSDEEP
384:6d3gdaSUlM9z5BUSMUtiJ+gK+qD8qsuSvNtmPWbtqpq/9R9dhqujV6M:IIvxgAPh+kNSaPWp5VR9WI
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-