General
-
Target
ecc9772e1ce10da67fa36eccb04facf4_JaffaCakes118
-
Size
142KB
-
Sample
240920-edljyaxana
-
MD5
ecc9772e1ce10da67fa36eccb04facf4
-
SHA1
6f265558af304d0d24b75f92726412e2c58fab18
-
SHA256
09f01c56f55ddcc492ab96f0de1660c3c247f4c452871582c37b084794799e13
-
SHA512
0d4667d6ad4600cececff29a6191dffd02bf8806b6cfc08392a230e332c69721d3a48225ab17af29bbc56b70337715a4f277dcf035806992dfeb8c60cbdef9b4
-
SSDEEP
1536:ALRD3bNqfNpu39IId5a6XP3Mg8afCqd4oF3Cgar3Pd0MZXiNjLoor:8R1qf69xak3MgxCZoMFr3Pd0MZXiNPvr
Static task
static1
Behavioral task
behavioral1
Sample
ecc9772e1ce10da67fa36eccb04facf4_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecc9772e1ce10da67fa36eccb04facf4_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://shop.mtcss.co.uk/wp-admin/USQFPj/
https://handfinger.com/wp-includes/iCY/
http://hanulmotors.com/nbqso/8Tz/
http://helpinghands4needy.org/wp-content/LgrI9g/
http://www.ecobaratocanaria.com/wordpress/Jt/
http://macerindia.com/wp-content/hRS/
http://cfn.tvstartup.com/wp-content/7dNH1LI/
Targets
-
-
Target
ecc9772e1ce10da67fa36eccb04facf4_JaffaCakes118
-
Size
142KB
-
MD5
ecc9772e1ce10da67fa36eccb04facf4
-
SHA1
6f265558af304d0d24b75f92726412e2c58fab18
-
SHA256
09f01c56f55ddcc492ab96f0de1660c3c247f4c452871582c37b084794799e13
-
SHA512
0d4667d6ad4600cececff29a6191dffd02bf8806b6cfc08392a230e332c69721d3a48225ab17af29bbc56b70337715a4f277dcf035806992dfeb8c60cbdef9b4
-
SSDEEP
1536:ALRD3bNqfNpu39IId5a6XP3Mg8afCqd4oF3Cgar3Pd0MZXiNjLoor:8R1qf69xak3MgxCZoMFr3Pd0MZXiNPvr
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-