General
-
Target
fba40d4a969cdd112bd1d5ec668b5ab3_JaffaCakes118
-
Size
234KB
-
Sample
240928-gntpeazfrj
-
MD5
fba40d4a969cdd112bd1d5ec668b5ab3
-
SHA1
4af3e6cf227059257852eb88d7a4570e58be6a8c
-
SHA256
7e92c6d43dc46e86975e6f04aa6079f82a3d9d6fb724c06fac8084581e408ab6
-
SHA512
ddbd548242a7daff7681d95e0569bc70b82471ea2230f23588539b766f995a8cdff2b314bd41d33aaab217747c782db511edb969ddcd7e3cbf72d7dbf5893e7b
-
SSDEEP
6144:14q/fsAYL6GzTmVLKql1KHCP4G3Ks0TXSqaz+/:WGUAYL6GzTmVLCigG6sSC7+
Behavioral task
behavioral1
Sample
fba40d4a969cdd112bd1d5ec668b5ab3_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fba40d4a969cdd112bd1d5ec668b5ab3_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
fba40d4a969cdd112bd1d5ec668b5ab3_JaffaCakes118
-
Size
234KB
-
MD5
fba40d4a969cdd112bd1d5ec668b5ab3
-
SHA1
4af3e6cf227059257852eb88d7a4570e58be6a8c
-
SHA256
7e92c6d43dc46e86975e6f04aa6079f82a3d9d6fb724c06fac8084581e408ab6
-
SHA512
ddbd548242a7daff7681d95e0569bc70b82471ea2230f23588539b766f995a8cdff2b314bd41d33aaab217747c782db511edb969ddcd7e3cbf72d7dbf5893e7b
-
SSDEEP
6144:14q/fsAYL6GzTmVLKql1KHCP4G3Ks0TXSqaz+/:WGUAYL6GzTmVLCigG6sSC7+
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-