General
-
Target
ea9c24d16117e8a2b598e61c1381798d_JaffaCakes118
-
Size
217KB
-
Sample
240919-fda9ms1gkb
-
MD5
ea9c24d16117e8a2b598e61c1381798d
-
SHA1
051fdb397089044459bf2a888ac7b8846238ec3c
-
SHA256
1ee23bc9e2a3807499d0fd736a4503235cc2d46e14429f19ff423fb2095bc38b
-
SHA512
efd9c22360016f8c7b3ee4847d290a486aa4508cc47ff1d4af151b953901e4bd8e3bbf8a2982a54bef720d2134627940f90b040e4ecc8169c0dadd61fd0d409b
-
SSDEEP
1536:KB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5J+a9/RQ3n7fxdSoNRs:K22TWTogk079THcpOu5UZQ3zBR5gnfz
Behavioral task
behavioral1
Sample
ea9c24d16117e8a2b598e61c1381798d_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9c24d16117e8a2b598e61c1381798d_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://fulfillmententertainment.com/cgi-bin/jO/
http://meadtimes.com/wp-content/VZrDrTw/
http://pinturasydecoracionluis.com/wp-admin/fK3/
http://oconsign.com/cgi-bin/koLViD/
http://umapreowned.com/wp-admin/XF7RBbs/
http://kitecorp.ca/wp-includes/kEI98N/
http://moneyii.com/website/ddeoUDo/
Targets
-
-
Target
ea9c24d16117e8a2b598e61c1381798d_JaffaCakes118
-
Size
217KB
-
MD5
ea9c24d16117e8a2b598e61c1381798d
-
SHA1
051fdb397089044459bf2a888ac7b8846238ec3c
-
SHA256
1ee23bc9e2a3807499d0fd736a4503235cc2d46e14429f19ff423fb2095bc38b
-
SHA512
efd9c22360016f8c7b3ee4847d290a486aa4508cc47ff1d4af151b953901e4bd8e3bbf8a2982a54bef720d2134627940f90b040e4ecc8169c0dadd61fd0d409b
-
SSDEEP
1536:KB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5J+a9/RQ3n7fxdSoNRs:K22TWTogk079THcpOu5UZQ3zBR5gnfz
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-