General
-
Target
ef12da113bc33f90f1333f3f09c48aae_JaffaCakes118
-
Size
153KB
-
Sample
240921-e6lqeavgmj
-
MD5
ef12da113bc33f90f1333f3f09c48aae
-
SHA1
b9706a0643cd89f07e25a8f43ed1d7b601e00a00
-
SHA256
418535f82699ce0df10d39ac2798fcce30da6070fb7b9b0f28562d1146f49e69
-
SHA512
0bd2d34824323cfefc354dbb1808f6474d978637e059c6be6aa71147432a5954533c63fbf10d69dc8c054f87b8750c4c52f89fb7d5ba90ab0867b7e5051f64b1
-
SSDEEP
1536:hAkT3yRFGEv0QtKPaOtMPAquK1gLadmpsHkkyeY+tB445TEgrO3jSWAg83tle1Ze:022TWTogk079THcpOu5UZ+rEuH
Static task
static1
Behavioral task
behavioral1
Sample
ef12da113bc33f90f1333f3f09c48aae_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef12da113bc33f90f1333f3f09c48aae_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://www.firhajshoes.com/wp-admin/RgaiT/
http://fakeread.com/OneSignal-Web-SDK-HTTPS-Integration-Files/Wf/
http://www.rttutoring.com/wp-includes/LlbY6o/
http://blueskysol.com/sys-cache/2Rk/
http://crazyboxs.com/cgi-bin/IaJ/
http://www.paramedicaleducationguidelines.com/wp-admin/3jXU5Bp/
http://nuhatoys.com/wp-admin/WWA4R/
Targets
-
-
Target
ef12da113bc33f90f1333f3f09c48aae_JaffaCakes118
-
Size
153KB
-
MD5
ef12da113bc33f90f1333f3f09c48aae
-
SHA1
b9706a0643cd89f07e25a8f43ed1d7b601e00a00
-
SHA256
418535f82699ce0df10d39ac2798fcce30da6070fb7b9b0f28562d1146f49e69
-
SHA512
0bd2d34824323cfefc354dbb1808f6474d978637e059c6be6aa71147432a5954533c63fbf10d69dc8c054f87b8750c4c52f89fb7d5ba90ab0867b7e5051f64b1
-
SSDEEP
1536:hAkT3yRFGEv0QtKPaOtMPAquK1gLadmpsHkkyeY+tB445TEgrO3jSWAg83tle1Ze:022TWTogk079THcpOu5UZ+rEuH
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-
Drops file in System32 directory
-