General
-
Target
ee69332cee99615667e1e2977001c8e9_JaffaCakes118
-
Size
143KB
-
Sample
240920-zsltgaxflf
-
MD5
ee69332cee99615667e1e2977001c8e9
-
SHA1
c6c38aef2cd89dd57b8984d34d96eaa18c9ff987
-
SHA256
faf7ed24aa5991a653301120b138611b6ab03b4b6241d93739d871c81cda1540
-
SHA512
4b012c0b890bac5aaf142dce86f2ce7bc0ff36d8b8cf73079bee3904ad3d8a9e38dc3d75eb9d87f351e3c44e286910ce3f4f743ba145ae81102a4bb27c747f5f
-
SSDEEP
1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmq4MxXOYgnJnIJe4SGOMKaK4/j:0R1qf69xak3MgxmrY0nae4sMKT6j
Static task
static1
Behavioral task
behavioral1
Sample
ee69332cee99615667e1e2977001c8e9_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee69332cee99615667e1e2977001c8e9_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://ibccglobal.com/thankyou2/ARA/
http://work.digitalvichar.com/1mv7clu/o/
http://13.229.25.57/7xdfb/jpA/
http://binarystationary.com/cgi-bin/5rM/
http://fmcav.com/images/ZQF/
https://kodiakheating.com/ldnha/ybI/
https://khvs.vrfantasy.gallery/igiodbck/eXq/
Targets
-
-
Target
ee69332cee99615667e1e2977001c8e9_JaffaCakes118
-
Size
143KB
-
MD5
ee69332cee99615667e1e2977001c8e9
-
SHA1
c6c38aef2cd89dd57b8984d34d96eaa18c9ff987
-
SHA256
faf7ed24aa5991a653301120b138611b6ab03b4b6241d93739d871c81cda1540
-
SHA512
4b012c0b890bac5aaf142dce86f2ce7bc0ff36d8b8cf73079bee3904ad3d8a9e38dc3d75eb9d87f351e3c44e286910ce3f4f743ba145ae81102a4bb27c747f5f
-
SSDEEP
1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmq4MxXOYgnJnIJe4SGOMKaK4/j:0R1qf69xak3MgxmrY0nae4sMKT6j
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-