General
-
Target
afdabb0054f015084c55a446118e3473_JaffaCakes118
-
Size
365KB
-
Sample
240820-tcdj9s1ake
-
MD5
afdabb0054f015084c55a446118e3473
-
SHA1
990487f1398d3fe950e38d20ca3f5d271ac7abf9
-
SHA256
7cf248bdae62a6ff5bbc41566eba5c85b3eaf6f5b22cdf46e56d2cb63a69ccba
-
SHA512
017d5efb60342835c17b563a8499b13f5f4eb1232db33acd31caa076e31f62539867765891ccd88503a1bc2727c36b4a5fcf7d33242096b656182878982b097e
-
SSDEEP
6144:sicARoup4jV7w0ba0lIvaRNlVA9I0R/kSp42WCzTf2kCUyBdLNgKsDesUBaKsYQc:0A2up4jV7Za0qvaRnKvxP4hiTf2k2b3J
Static task
static1
Behavioral task
behavioral1
Sample
afdabb0054f015084c55a446118e3473_JaffaCakes118.docm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
afdabb0054f015084c55a446118e3473_JaffaCakes118.docm
Resource
win10v2004-20240802-en
Malware Config
Extracted
hancitor
0402_pogi
http://feirecropl.com/8/forum.php
http://oresteseu.ru/8/forum.php
http://respoishis.ru/8/forum.php
Targets
-
-
Target
afdabb0054f015084c55a446118e3473_JaffaCakes118
-
Size
365KB
-
MD5
afdabb0054f015084c55a446118e3473
-
SHA1
990487f1398d3fe950e38d20ca3f5d271ac7abf9
-
SHA256
7cf248bdae62a6ff5bbc41566eba5c85b3eaf6f5b22cdf46e56d2cb63a69ccba
-
SHA512
017d5efb60342835c17b563a8499b13f5f4eb1232db33acd31caa076e31f62539867765891ccd88503a1bc2727c36b4a5fcf7d33242096b656182878982b097e
-
SSDEEP
6144:sicARoup4jV7w0ba0lIvaRNlVA9I0R/kSp42WCzTf2kCUyBdLNgKsDesUBaKsYQc:0A2up4jV7Za0qvaRnKvxP4hiTf2k2b3J
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-