General
-
Target
ce3456eeddde5542839a26e26e8fcef6_JaffaCakes118
-
Size
220KB
-
Sample
240906-ab61mswcjc
-
MD5
ce3456eeddde5542839a26e26e8fcef6
-
SHA1
e2ba6846d1622221ca2167ee90e2586e5dab4735
-
SHA256
507e7abb40947dfb7985ab2e1986bef80a9352e6cb5770c369422562a4df203d
-
SHA512
e3f10b314575af8ad277e671d50010208dc374653bbe42e0a7d2d601126d0803d1ee203ab7f2eaaac5f4e4e9d6c8719404568166446dc4bb84f30a4d4dd9d85d
-
SSDEEP
3072:b4tcTvjvTY140818tIP4ovpkSGju9jDW1M+7Wp3C:EtcnvE140o8tIP4apHjDjmkC
Behavioral task
behavioral1
Sample
ce3456eeddde5542839a26e26e8fcef6_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce3456eeddde5542839a26e26e8fcef6_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://hottco.com/stats/erd/
http://dutarini.com/cgi-bin/6/
https://brownshotelgroup.com/www.brownshotelgroup.com.pt/i9/
http://pastaciyiz.biz/wp-includes/fvx/
https://dogaltrm.com/components/r6h/
https://dortislem.net/administrator/c/
https://onyourleftracing.com/cgi-bin/QcC/
Targets
-
-
Target
ce3456eeddde5542839a26e26e8fcef6_JaffaCakes118
-
Size
220KB
-
MD5
ce3456eeddde5542839a26e26e8fcef6
-
SHA1
e2ba6846d1622221ca2167ee90e2586e5dab4735
-
SHA256
507e7abb40947dfb7985ab2e1986bef80a9352e6cb5770c369422562a4df203d
-
SHA512
e3f10b314575af8ad277e671d50010208dc374653bbe42e0a7d2d601126d0803d1ee203ab7f2eaaac5f4e4e9d6c8719404568166446dc4bb84f30a4d4dd9d85d
-
SSDEEP
3072:b4tcTvjvTY140818tIP4ovpkSGju9jDW1M+7Wp3C:EtcnvE140o8tIP4apHjDjmkC
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-