General
-
Target
ed10bfff758a80752bd072e93cb7e7f8_JaffaCakes118
-
Size
208KB
-
Sample
240920-hsy1cstfqb
-
MD5
ed10bfff758a80752bd072e93cb7e7f8
-
SHA1
aeeacf51e3d94351b658676cd2085d863241ec40
-
SHA256
dde1e4beb358bf4ab02fdad1e477b603c116bfa2c39d9c4c42740738304d4ed7
-
SHA512
d9e8e7e5983e4c7b44ab4e0a7ada73ee5e2a992ea41ab2edf1e4750bc64c787419dad14b56ce2a35b6c0d5a66857e52bf0d58e0080fa35014b387e77c57277f7
-
SSDEEP
6144:XgULVG5HuJG1VqDTQpzAiXajJ7qxPmdvmZ:XtGkIbzvX2qxA
Behavioral task
behavioral1
Sample
ed10bfff758a80752bd072e93cb7e7f8_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed10bfff758a80752bd072e93cb7e7f8_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://hawkinscs.com/uBmDMGkJ
http://hydrocarbonreports.com/0
http://grupovisionpr.com/GJjBPh
http://ajx3.com/akDJlHl
http://kazak.zendo.in.ua/7G4P
Targets
-
-
Target
ed10bfff758a80752bd072e93cb7e7f8_JaffaCakes118
-
Size
208KB
-
MD5
ed10bfff758a80752bd072e93cb7e7f8
-
SHA1
aeeacf51e3d94351b658676cd2085d863241ec40
-
SHA256
dde1e4beb358bf4ab02fdad1e477b603c116bfa2c39d9c4c42740738304d4ed7
-
SHA512
d9e8e7e5983e4c7b44ab4e0a7ada73ee5e2a992ea41ab2edf1e4750bc64c787419dad14b56ce2a35b6c0d5a66857e52bf0d58e0080fa35014b387e77c57277f7
-
SSDEEP
6144:XgULVG5HuJG1VqDTQpzAiXajJ7qxPmdvmZ:XtGkIbzvX2qxA
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-