General
-
Target
ee6ee4d3076e89ac50e38261058012b2_JaffaCakes118
-
Size
185KB
-
Sample
240920-z2sy5sycqp
-
MD5
ee6ee4d3076e89ac50e38261058012b2
-
SHA1
a13416c9f0430b47ddff2d4eb66a324afb8d37c5
-
SHA256
3d0173175bbc0f83d9a5a2b8324c817f6a433756949f63691ec5374d82859a6f
-
SHA512
d7559ef5442697bcd2865a38ecad53a4801b0e310cf74e5e99c5ab9489b8a165489f26e3dcdb9f4e36cf688b2ab49ab6257c9f5a8c5bf8632d0a1ce26bbab257
-
SSDEEP
3072:S4PrXcuQuvpzm4bkiaMQgAlSKOgiWMYKg6wohjP:TDRv1m4bnQgISKOxWM66wohjP
Behavioral task
behavioral1
Sample
ee6ee4d3076e89ac50e38261058012b2_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ee6ee4d3076e89ac50e38261058012b2_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://marinamet.work/wp-admin/ksx2892006/
http://www.slservicebd.com/wp-content/ezP/
http://ajedrezenmorelos.com/imagenes/bcPAkRelh/
http://mckinzielaw.com/mail/HQfOiQnjpTTIp/
https://konican.com/cgi-bin/gpZCxzCpR/
https://medfront.mx/gkxbo/FXUaGblNTfMNS/
https://aerofoam.radishdevelopment.nl/alfacgiapi/cFGILh/
Targets
-
-
Target
ee6ee4d3076e89ac50e38261058012b2_JaffaCakes118
-
Size
185KB
-
MD5
ee6ee4d3076e89ac50e38261058012b2
-
SHA1
a13416c9f0430b47ddff2d4eb66a324afb8d37c5
-
SHA256
3d0173175bbc0f83d9a5a2b8324c817f6a433756949f63691ec5374d82859a6f
-
SHA512
d7559ef5442697bcd2865a38ecad53a4801b0e310cf74e5e99c5ab9489b8a165489f26e3dcdb9f4e36cf688b2ab49ab6257c9f5a8c5bf8632d0a1ce26bbab257
-
SSDEEP
3072:S4PrXcuQuvpzm4bkiaMQgAlSKOgiWMYKg6wohjP:TDRv1m4bnQgISKOxWM66wohjP
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-