General
-
Target
e222f7c5d4f17f4222323441f4ca1f63_JaffaCakes118
-
Size
138KB
-
Sample
240915-kzwjxswamf
-
MD5
e222f7c5d4f17f4222323441f4ca1f63
-
SHA1
9be04e3a57a50e71d72ca650fcac4438c3913fea
-
SHA256
13b98d2f0d07581934fcff17efd69c9924d5cc1d0bb874c28eaaeb497cba7bb4
-
SHA512
cc6dc0e635db62499261099ec38bf1cb3db93a27c92f3252da3f26b8afa35f514eac0a67e592709021bead46da7d4d3e1fe67cb42d027ec84e856e0606a089d8
-
SSDEEP
1536:mxRD3bNqfNpu39IId5a6XP3Mg8afyqcTqc380Y:ER1qf69xak3Mgxy7qI80Y
Static task
static1
Behavioral task
behavioral1
Sample
e222f7c5d4f17f4222323441f4ca1f63_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e222f7c5d4f17f4222323441f4ca1f63_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://edu.jmsvclass.com/wp-includes/sZmjSq/
http://darkblessing.net/e4wftkpn/KNAO9/
http://trancisconsulting.com/wp-admin/EEoF/
http://devanyastore.com/wp-content/9J56juA/
http://healthcureathome.com/ALFA_DATA/iKSdCK6/
http://www.szwymall.com/wp-content/j29mvS/
http://www.jornco.com/wp-admin/UT0xBJw/
Targets
-
-
Target
e222f7c5d4f17f4222323441f4ca1f63_JaffaCakes118
-
Size
138KB
-
MD5
e222f7c5d4f17f4222323441f4ca1f63
-
SHA1
9be04e3a57a50e71d72ca650fcac4438c3913fea
-
SHA256
13b98d2f0d07581934fcff17efd69c9924d5cc1d0bb874c28eaaeb497cba7bb4
-
SHA512
cc6dc0e635db62499261099ec38bf1cb3db93a27c92f3252da3f26b8afa35f514eac0a67e592709021bead46da7d4d3e1fe67cb42d027ec84e856e0606a089d8
-
SSDEEP
1536:mxRD3bNqfNpu39IId5a6XP3Mg8afyqcTqc380Y:ER1qf69xak3Mgxy7qI80Y
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-