General
-
Target
eaa94f2700c2fb2a8bf8d8c556a147ff_JaffaCakes118
-
Size
188KB
-
Sample
240919-f17alashmj
-
MD5
eaa94f2700c2fb2a8bf8d8c556a147ff
-
SHA1
2e019b9cf69a16371a87b72c78ef8ec9d17cd8ee
-
SHA256
20afdfa7a7c7a299565cdd046c41bcbea4b1cbdc4041edc9f0e51d52dac04a0c
-
SHA512
5f0c515563ffbc6c91e77091a8444a3c614e1d03fd9c794b73fe999c073ca40e1fb86ac6a7dc67fa660c5c8e4f64cd70134cac8cb60a6dcd31e0b933b8ab5756
-
SSDEEP
1536:rrdi1Ir77zOH98Wj2gpngt+a9xG37MgT7TxZk5tBRt9k6p+A:rrfrzOH98ipgkrMgT3ytHt9Zp+A
Behavioral task
behavioral1
Sample
eaa94f2700c2fb2a8bf8d8c556a147ff_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa94f2700c2fb2a8bf8d8c556a147ff_JaffaCakes118.doc
Resource
win10v2004-20240910-en
Malware Config
Extracted
http://geisterhouse.com/cgi-bin/LAb1/
http://amyemitchell.com/themes/w/
http://forestanalytics.net/images/57A7/
https://konican.com/cgi-bin/cWu/
http://strike3productions.com/squad/3aV6xrH/
http://riandutra.com/img/wOMENgh/
http://justinscott.com.au/sites/rRS/
Targets
-
-
Target
eaa94f2700c2fb2a8bf8d8c556a147ff_JaffaCakes118
-
Size
188KB
-
MD5
eaa94f2700c2fb2a8bf8d8c556a147ff
-
SHA1
2e019b9cf69a16371a87b72c78ef8ec9d17cd8ee
-
SHA256
20afdfa7a7c7a299565cdd046c41bcbea4b1cbdc4041edc9f0e51d52dac04a0c
-
SHA512
5f0c515563ffbc6c91e77091a8444a3c614e1d03fd9c794b73fe999c073ca40e1fb86ac6a7dc67fa660c5c8e4f64cd70134cac8cb60a6dcd31e0b933b8ab5756
-
SSDEEP
1536:rrdi1Ir77zOH98Wj2gpngt+a9xG37MgT7TxZk5tBRt9k6p+A:rrfrzOH98ipgkrMgT3ytHt9Zp+A
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-