General
-
Target
f1b66d86344a6b7721cee9092bec9d69_JaffaCakes118
-
Size
1.2MB
-
Sample
240922-k5lxnssaqd
-
MD5
f1b66d86344a6b7721cee9092bec9d69
-
SHA1
880f0e144fe4ae8952a7318d5d4320b459c86ec2
-
SHA256
c2237f9c8ee1a6ea3503bf86ac791a4a9ffeb27eaf2fb7ebe48ec39957499824
-
SHA512
6351d57787f38e488c1d9fcb05dd09f3585a7d9b044d8476d13e9850cf15604738c9d1e55e405a1d6ebe22af40fcb384a07559faf02cc94c2124afa4a908a6e1
-
SSDEEP
24576:xIRIvf2xOXNy63VkuisU4YyAeXqom4WnOCUsWQKleynbtl5s:0
Static task
static1
Behavioral task
behavioral1
Sample
f1b66d86344a6b7721cee9092bec9d69_JaffaCakes118.rtf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1b66d86344a6b7721cee9092bec9d69_JaffaCakes118.rtf
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://globalogroup.com/group/bal/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
f1b66d86344a6b7721cee9092bec9d69_JaffaCakes118
-
Size
1.2MB
-
MD5
f1b66d86344a6b7721cee9092bec9d69
-
SHA1
880f0e144fe4ae8952a7318d5d4320b459c86ec2
-
SHA256
c2237f9c8ee1a6ea3503bf86ac791a4a9ffeb27eaf2fb7ebe48ec39957499824
-
SHA512
6351d57787f38e488c1d9fcb05dd09f3585a7d9b044d8476d13e9850cf15604738c9d1e55e405a1d6ebe22af40fcb384a07559faf02cc94c2124afa4a908a6e1
-
SSDEEP
24576:xIRIvf2xOXNy63VkuisU4YyAeXqom4WnOCUsWQKleynbtl5s:0
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1