General
-
Target
ed3e0854716882ece0c1a44c1b891e57_JaffaCakes118
-
Size
150KB
-
Sample
240920-kr22qsycrj
-
MD5
ed3e0854716882ece0c1a44c1b891e57
-
SHA1
3e42aefc0570f57dd65def6d04cd6354a97f8479
-
SHA256
3db5537afa72bac1ad7529d5026dc4962d42b2e6af1cb12235cfc1f8751676b5
-
SHA512
eafa39664388a43066bc95a18e4a5797e55a79a298b8cad95dd5a265f8751627d84ff3ca77728e397abc275f554057869337011fb9d39f1f5950476051215299
-
SSDEEP
1536:mPiRmz80TdayTTtlj8S1PyswwPOhjS8lIAkAkB445TEgrO3jSWAg83tle1ZZ029C:T422TWTogk079THcpOu5UZ+OQ4y/jn
Static task
static1
Behavioral task
behavioral1
Sample
ed3e0854716882ece0c1a44c1b891e57_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed3e0854716882ece0c1a44c1b891e57_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://h2a1.com/uf8vu/U/
http://www.almakaaseb.com/wp-includes/P/
http://theitnconsultant.com/wp-includes/t/
http://carstarai.com/icon/D/
http://bug.chihuahuamediaprojects.com/wp-includes/u/
https://aecc.dev.caveim.net/wp-admin/dZ/
http://phimsex.2xxhub.com/wp-content/esp/5ur8drbma/6qH/
Targets
-
-
Target
ed3e0854716882ece0c1a44c1b891e57_JaffaCakes118
-
Size
150KB
-
MD5
ed3e0854716882ece0c1a44c1b891e57
-
SHA1
3e42aefc0570f57dd65def6d04cd6354a97f8479
-
SHA256
3db5537afa72bac1ad7529d5026dc4962d42b2e6af1cb12235cfc1f8751676b5
-
SHA512
eafa39664388a43066bc95a18e4a5797e55a79a298b8cad95dd5a265f8751627d84ff3ca77728e397abc275f554057869337011fb9d39f1f5950476051215299
-
SSDEEP
1536:mPiRmz80TdayTTtlj8S1PyswwPOhjS8lIAkAkB445TEgrO3jSWAg83tle1ZZ029C:T422TWTogk079THcpOu5UZ+OQ4y/jn
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-