General
-
Target
eac0c3fc2f11425eecf5394b4f74dc34_JaffaCakes118
-
Size
150KB
-
Sample
240919-g5mbnavfkm
-
MD5
eac0c3fc2f11425eecf5394b4f74dc34
-
SHA1
6e53b4a44c614fa3d753d5b33c7365efa2164f31
-
SHA256
0ad6a98cb8928f61b66604f06096da02a0fa94d3c5e67db08ead722adddc8f7c
-
SHA512
b41bb37a2561879991255cf349dff1bed762d455b8755974a5acaf2c57ff9ff5a4979db531ec9b0beff09819aa4304d433c4d38ba7ba94cb018ee0b0c42fc385
-
SSDEEP
1536:mPiRmz80TdayTTtlj8S1PyswwPOhjS8lIAkAkB445TEgrO3jSWAg83tle1ZZ029Q:T422TWTogk079THcpOu5UZ+UQ4y/jP
Static task
static1
Behavioral task
behavioral1
Sample
eac0c3fc2f11425eecf5394b4f74dc34_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac0c3fc2f11425eecf5394b4f74dc34_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://h2a1.com/uf8vu/U/
http://www.almakaaseb.com/wp-includes/P/
http://theitnconsultant.com/wp-includes/t/
http://carstarai.com/icon/D/
http://bug.chihuahuamediaprojects.com/wp-includes/u/
https://aecc.dev.caveim.net/wp-admin/dZ/
http://phimsex.2xxhub.com/wp-content/esp/5ur8drbma/6qH/
Targets
-
-
Target
eac0c3fc2f11425eecf5394b4f74dc34_JaffaCakes118
-
Size
150KB
-
MD5
eac0c3fc2f11425eecf5394b4f74dc34
-
SHA1
6e53b4a44c614fa3d753d5b33c7365efa2164f31
-
SHA256
0ad6a98cb8928f61b66604f06096da02a0fa94d3c5e67db08ead722adddc8f7c
-
SHA512
b41bb37a2561879991255cf349dff1bed762d455b8755974a5acaf2c57ff9ff5a4979db531ec9b0beff09819aa4304d433c4d38ba7ba94cb018ee0b0c42fc385
-
SSDEEP
1536:mPiRmz80TdayTTtlj8S1PyswwPOhjS8lIAkAkB445TEgrO3jSWAg83tle1ZZ029Q:T422TWTogk079THcpOu5UZ+UQ4y/jP
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-