General
-
Target
ecb8256ab0c295cddbb61a8aab1d7127_JaffaCakes118
-
Size
177KB
-
Sample
240920-dj6avswcjk
-
MD5
ecb8256ab0c295cddbb61a8aab1d7127
-
SHA1
cf2b270b44b0d06b2cef4b4c501017c91cf46b0d
-
SHA256
d938a351cd53531afe37e3d05e3a230410c8498ce4a18a4b0cd9f16a7791ae5d
-
SHA512
b65bcdb631497a43d922a3464bd50298cf088db67c5fdfdd464894e28b350baca95a1785fea622082ed079eadd52cbe3b03e56ceb973fa49856a12d65a8da502
-
SSDEEP
1536:q5M8Na9quLeJ1b5VahG/A8k/gvjl0NZqDlGffQanLzdf7RqNYO4OvqTl1ygpdavR:SUqJ1NgsA8k/gvh0NZ0lGX1nZ7REYO
Static task
static1
Behavioral task
behavioral1
Sample
ecb8256ab0c295cddbb61a8aab1d7127_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecb8256ab0c295cddbb61a8aab1d7127_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://famousdiagnosticcenter.com/wp-admin/7wX/
http://www.govtcollegesihunta.com/wp-includes/hX/
http://jegsnet.com/wp-content/lPr/
http://fenekformalas.newquantumlogic.com/webstat/G/
http://helixity-india.com/wp-content/M/
https://www.buntebenelux.com/wp-admin/cbW/
http://swso2.com/wp-admin/a/
Targets
-
-
Target
ecb8256ab0c295cddbb61a8aab1d7127_JaffaCakes118
-
Size
177KB
-
MD5
ecb8256ab0c295cddbb61a8aab1d7127
-
SHA1
cf2b270b44b0d06b2cef4b4c501017c91cf46b0d
-
SHA256
d938a351cd53531afe37e3d05e3a230410c8498ce4a18a4b0cd9f16a7791ae5d
-
SHA512
b65bcdb631497a43d922a3464bd50298cf088db67c5fdfdd464894e28b350baca95a1785fea622082ed079eadd52cbe3b03e56ceb973fa49856a12d65a8da502
-
SSDEEP
1536:q5M8Na9quLeJ1b5VahG/A8k/gvjl0NZqDlGffQanLzdf7RqNYO4OvqTl1ygpdavR:SUqJ1NgsA8k/gvh0NZ0lGX1nZ7REYO
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-