General
-
Target
de26972bb293b28eb74ade9cd1c750f8_JaffaCakes118
-
Size
144KB
-
Sample
240913-lmdc9awepk
-
MD5
de26972bb293b28eb74ade9cd1c750f8
-
SHA1
32f0665970eee3b2b712a9e13cd86a5701879324
-
SHA256
a4c72f0d5e93dff6abe76ec873aecf3c626c1086d23f1316338c4d4a45eb4aee
-
SHA512
df5b17256b41e70b9d0288833d990db77bd33dc66d4395304044dc2d140a6a53a8e4cddd49ae5392fa614b09b28a5d6c1d27b370001342672c698e2cb4c4d5fc
-
SSDEEP
1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqHMxXOYgnJnIJe4SGOMKaK4/T:0R1qf69xak3MgxmuY0nae4sMKT6T
Static task
static1
Behavioral task
behavioral1
Sample
de26972bb293b28eb74ade9cd1c750f8_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de26972bb293b28eb74ade9cd1c750f8_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://ibccglobal.com/thankyou2/ARA/
http://work.digitalvichar.com/1mv7clu/o/
http://13.229.25.57/7xdfb/jpA/
http://binarystationary.com/cgi-bin/5rM/
http://fmcav.com/images/ZQF/
https://kodiakheating.com/ldnha/ybI/
https://khvs.vrfantasy.gallery/igiodbck/eXq/
Targets
-
-
Target
de26972bb293b28eb74ade9cd1c750f8_JaffaCakes118
-
Size
144KB
-
MD5
de26972bb293b28eb74ade9cd1c750f8
-
SHA1
32f0665970eee3b2b712a9e13cd86a5701879324
-
SHA256
a4c72f0d5e93dff6abe76ec873aecf3c626c1086d23f1316338c4d4a45eb4aee
-
SHA512
df5b17256b41e70b9d0288833d990db77bd33dc66d4395304044dc2d140a6a53a8e4cddd49ae5392fa614b09b28a5d6c1d27b370001342672c698e2cb4c4d5fc
-
SSDEEP
1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqHMxXOYgnJnIJe4SGOMKaK4/T:0R1qf69xak3MgxmuY0nae4sMKT6T
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-