General
-
Target
ed6428b8d3e8082dbd602561ad399213_JaffaCakes118
-
Size
176KB
-
Sample
240920-mgl9ms1gmb
-
MD5
ed6428b8d3e8082dbd602561ad399213
-
SHA1
14b1339f026f000f1c162400b215d1b41b279b7d
-
SHA256
6a4f1212417249a2a041859ef4fcb7c2968111ee6273aaf0fa840e06c7905b52
-
SHA512
29716e94adcd5f0aa684a5177694f96d8d5d8106d403caea54712b06398afccaf71babf20989370922d9e3bf7067cdaecd1d8550ac9f6a978f10ae331206aee9
-
SSDEEP
3072:UUqJ1NgsA8k/gvh0NZ0lGX1nZ7hq7Q8eK0:UBtgVIveNZvn+88x0
Static task
static1
Behavioral task
behavioral1
Sample
ed6428b8d3e8082dbd602561ad399213_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed6428b8d3e8082dbd602561ad399213_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://babyshop.webdungsan.com/wp-admin/n/
http://nguyenlieuphachehanoi.com/wp-admin/kL/
http://notesever.com/cgi-bin/Cfs/
http://superbetprediction.com/js/Qo/
http://pattanitkpark.com/gipe2h/iqt/
http://www.xxdaytoy.top/wp-content/E/
http://huaibangchina.com/kic3kc/c/
Targets
-
-
Target
ed6428b8d3e8082dbd602561ad399213_JaffaCakes118
-
Size
176KB
-
MD5
ed6428b8d3e8082dbd602561ad399213
-
SHA1
14b1339f026f000f1c162400b215d1b41b279b7d
-
SHA256
6a4f1212417249a2a041859ef4fcb7c2968111ee6273aaf0fa840e06c7905b52
-
SHA512
29716e94adcd5f0aa684a5177694f96d8d5d8106d403caea54712b06398afccaf71babf20989370922d9e3bf7067cdaecd1d8550ac9f6a978f10ae331206aee9
-
SSDEEP
3072:UUqJ1NgsA8k/gvh0NZ0lGX1nZ7hq7Q8eK0:UBtgVIveNZvn+88x0
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-