General
-
Target
eaad00b224d46e24343ea5990ba9356b_JaffaCakes118
-
Size
158KB
-
Sample
240919-f7se1sshpd
-
MD5
eaad00b224d46e24343ea5990ba9356b
-
SHA1
91db1cf78806dd1e68732eb050686f7bf57e3ea3
-
SHA256
a9eaf02d745472a4b410b1baef20b073bce933c2e1c7a99fb183e33a47a2e622
-
SHA512
d901e3977ac4ddb598e91a70a0c3161a132326383d2d9b8b4aca30c6d23c7cb833070e1a7d49a720ffee63c8c57d20bb84edb100f93d079940955e42e888537e
-
SSDEEP
1536:TB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5F+a9OPzlnb3hSJ:T22TWTogk079THcpOu5UZ4P5b3hSJ
Static task
static1
Behavioral task
behavioral1
Sample
eaad00b224d46e24343ea5990ba9356b_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaad00b224d46e24343ea5990ba9356b_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://jobcapper.com/8.7.19/hrS/
http://scoomie.com/wp-content/uploads/mxjsB/
https://blog.workshots.net/bibqcr9/Eki/
https://hxoptical.net/wp-admin/91C/
https://adidasnmdfootlocker.com/nc_assets/F/
http://socylmediapc.es/tools/D7Ogq/
http://lombardzista.pl/wp-content/r/
Targets
-
-
Target
eaad00b224d46e24343ea5990ba9356b_JaffaCakes118
-
Size
158KB
-
MD5
eaad00b224d46e24343ea5990ba9356b
-
SHA1
91db1cf78806dd1e68732eb050686f7bf57e3ea3
-
SHA256
a9eaf02d745472a4b410b1baef20b073bce933c2e1c7a99fb183e33a47a2e622
-
SHA512
d901e3977ac4ddb598e91a70a0c3161a132326383d2d9b8b4aca30c6d23c7cb833070e1a7d49a720ffee63c8c57d20bb84edb100f93d079940955e42e888537e
-
SSDEEP
1536:TB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5F+a9OPzlnb3hSJ:T22TWTogk079THcpOu5UZ4P5b3hSJ
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-