General
-
Target
eddd6ccb6801986267e55fc7a676aeb4_JaffaCakes118
-
Size
814KB
-
Sample
240920-smkkwssgph
-
MD5
eddd6ccb6801986267e55fc7a676aeb4
-
SHA1
a0b02e09425f5a21b0936d9de18703a7b2e858a5
-
SHA256
6cb226cb2bc243d2b6b0421624a03ef846377b4527df1bc908b76f7b2a871f6d
-
SHA512
5da7b04d9d61405a2420140455a9f91c5ef7ac6866eb1f15ca2641a965f4d708a50a5c38f5704ae5cc9e0303d3f5eb7933fa527df35e0966f82a12458b69cffb
-
SSDEEP
12288:e+WhWEyIulu5kghlYyUyY0WoXf+WMyzVodUqGHXoqYH6N79/v5kgMZ:eIRIj5kghmyvffAy2GV4PaN79/v5kgw
Static task
static1
Behavioral task
behavioral1
Sample
eddd6ccb6801986267e55fc7a676aeb4_JaffaCakes118.rtf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eddd6ccb6801986267e55fc7a676aeb4_JaffaCakes118.rtf
Resource
win10v2004-20240802-en
Malware Config
Extracted
formbook
3.8
ch36
hookbug.com
useicar.net
plentyofhosting.com
finalmary.win
pacwestcoastalproperties.com
prideharmonyfoundation.com
royaltakeout.com
lephare-shop.com
alphaomeganetworks.com
solistkonsilanlari.com
yj-info.net
badajozbeerlab.com
wwwjsvip9999.com
centraltexasrvpark.net
hosofb789.com
roademissions.com
toscanaristorazione.com
jrmsj.com
sweetsncandy.com
hzcrgg.com
sonerpar.com
xn--68s.com
tulacoin.com
fotoknihy.cloud
baguettebistro.net
miranet-technologies.com
bricksontour.com
gsbg.online
cameroonmarketing.com
simphiwe.com
shuangsim.com
qg0ficll0.biz
marcosnovaisedaniela.com
bleuproof.com
v64w3.info
eugeniaolenka.com
fi0rgl.info
chenyunchao.com
8o474.com
dijar.win
lorenzofernando.com
zebrita.com
techhomebuilding.net
thenexus.email
primavalve.com
legiondj.com
newbjlhuedu.com
wobblyfinancials.life
killignorancenotourkids.info
comoestouvencendoaobesidade.com
vendorscafe.com
manette-playstation.com
dtchun.com
lahdee.net
bestpetmed.com
miro.ltd
hierges.net
fairytalefitness.com
crb.company
mysignage.net
rockmakerscissors.info
apkspices.com
astronumerologyreading.com
mamstreet.com
empoweremyv.com
Targets
-
-
Target
eddd6ccb6801986267e55fc7a676aeb4_JaffaCakes118
-
Size
814KB
-
MD5
eddd6ccb6801986267e55fc7a676aeb4
-
SHA1
a0b02e09425f5a21b0936d9de18703a7b2e858a5
-
SHA256
6cb226cb2bc243d2b6b0421624a03ef846377b4527df1bc908b76f7b2a871f6d
-
SHA512
5da7b04d9d61405a2420140455a9f91c5ef7ac6866eb1f15ca2641a965f4d708a50a5c38f5704ae5cc9e0303d3f5eb7933fa527df35e0966f82a12458b69cffb
-
SSDEEP
12288:e+WhWEyIulu5kghlYyUyY0WoXf+WMyzVodUqGHXoqYH6N79/v5kgMZ:eIRIj5kghmyvffAy2GV4PaN79/v5kgw
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1