General
-
Target
de0d8b18c966010991edbdb758bbbdb6_JaffaCakes118
-
Size
151KB
-
Sample
240913-kctf2stdkm
-
MD5
de0d8b18c966010991edbdb758bbbdb6
-
SHA1
c31795d52a9350f9c9189d4cf5c3180b53dd45a7
-
SHA256
7e348cbf0bb85b15e9f742193f2073ad5cd0cda176a4f0da91a947f9bcb54b6b
-
SHA512
09db5b59600f1ee7c09ef784aa69a95d602df2e22ea30a622b41d2328b3c3914cb6a9b846be17e53bec95879a9b10ad770e663d8cda79b6d0a471d8c1c2714e7
-
SSDEEP
1536:8H1DB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5J+a9DiYFHC3qoXe:O22TWTogk079THcpOu5UZJVdCVtBQoy
Static task
static1
Behavioral task
behavioral1
Sample
de0d8b18c966010991edbdb758bbbdb6_JaffaCakes118.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
de0d8b18c966010991edbdb758bbbdb6_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://priyamcollection.com/cab/f/
http://querofornecedores.com/wp-includes/images/D/
https://hulianwang114.com/attachment/c/
http://ixirhost.xyz/wp-content/z/
https://weneedyourhelpnow.org/wp-content/LJ/
https://averyair.com/wp-content/J/
https://drippglobal.com/wp-content/rV/
Targets
-
-
Target
de0d8b18c966010991edbdb758bbbdb6_JaffaCakes118
-
Size
151KB
-
MD5
de0d8b18c966010991edbdb758bbbdb6
-
SHA1
c31795d52a9350f9c9189d4cf5c3180b53dd45a7
-
SHA256
7e348cbf0bb85b15e9f742193f2073ad5cd0cda176a4f0da91a947f9bcb54b6b
-
SHA512
09db5b59600f1ee7c09ef784aa69a95d602df2e22ea30a622b41d2328b3c3914cb6a9b846be17e53bec95879a9b10ad770e663d8cda79b6d0a471d8c1c2714e7
-
SSDEEP
1536:8H1DB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5J+a9DiYFHC3qoXe:O22TWTogk079THcpOu5UZJVdCVtBQoy
Score10/10-
Blocklisted process makes network request
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-
Drops file in System32 directory
-