General
-
Target
ed16fa62688ff2c245f7dbc6b843de6c_JaffaCakes118
-
Size
227KB
-
Sample
240920-h4yhzavble
-
MD5
ed16fa62688ff2c245f7dbc6b843de6c
-
SHA1
9a907d5873d1a92b7236d08773489a4626b2db3b
-
SHA256
fff5ababe982e206dcb90025f198c2dee4bb9d0e8fee9a7b146ea3421db0cc78
-
SHA512
ae8e176a9ae79ae33b85055f633d84c3dd135437f98fbf78a431fe8db0977d3ac30b0bf7793900523f14e61c00c82626cadc5a7326d035a777c2bd53948c3644
-
SSDEEP
3072:1j6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkOl3O+zzqEwQbR9T:1HgtEWPsL/aTyT9GkOle+zzXwQbRV
Behavioral task
behavioral1
Sample
ed16fa62688ff2c245f7dbc6b843de6c_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed16fa62688ff2c245f7dbc6b843de6c_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://www.hammockworld.co.nz/imgs/xyTBsz/
http://seatrade.com.eg/index_files/OGUwzJl/
http://www.nancywhite-realtor.com/wp-content/qavvddXh/
http://skullmedia.de/befroe.de/eyiY/
https://damoshushu.com/wp-content/xhcurZgXJ/
Targets
-
-
Target
ed16fa62688ff2c245f7dbc6b843de6c_JaffaCakes118
-
Size
227KB
-
MD5
ed16fa62688ff2c245f7dbc6b843de6c
-
SHA1
9a907d5873d1a92b7236d08773489a4626b2db3b
-
SHA256
fff5ababe982e206dcb90025f198c2dee4bb9d0e8fee9a7b146ea3421db0cc78
-
SHA512
ae8e176a9ae79ae33b85055f633d84c3dd135437f98fbf78a431fe8db0977d3ac30b0bf7793900523f14e61c00c82626cadc5a7326d035a777c2bd53948c3644
-
SSDEEP
3072:1j6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkOl3O+zzqEwQbR9T:1HgtEWPsL/aTyT9GkOle+zzXwQbRV
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-