General
-
Target
4d478c33b8134fa3553362d1d9648cb5_JaffaCakes118
-
Size
133KB
-
Sample
241016-rj5wzstdjh
-
MD5
4d478c33b8134fa3553362d1d9648cb5
-
SHA1
7204c708eecf449af04acaa9537e4bfeea625e13
-
SHA256
fa9052ec297d39514aec2cdbdf04a5bb53e0e8a67760070e56e09e43d4acf738
-
SHA512
3c6491b657ea4302d499b646f49189ed3bdc7f605ac33155f72d0408bda6f749a58eb932a7ac1c5c1ad11c0f7b49db761cdcd884b829bb2caaabdd2e03d75e3c
-
SSDEEP
3072:A77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8q3DdUL3MsN0a:A77HUUUUUUUUUUUUUUUUUUUT52VkhUcW
Static task
static1
Behavioral task
behavioral1
Sample
4d478c33b8134fa3553362d1d9648cb5_JaffaCakes118.doc
Resource
win7-20240903-en
Malware Config
Extracted
https://mobilizr.com/slagmite/vfao_7pkco0lob-674967226/
http://mmesupport.com/upload_docs/7qnxu0_on92iv5o8u-07294/
https://miv-survey.com/ws/xz8yftcm6t_bdxduwga3w-3/
http://moolo.pl/pub/NauVcJcbPH/
http://mstation.jp/2004christmas/ybgiax_c3bk83e7-33621494/
Targets
-
-
Target
4d478c33b8134fa3553362d1d9648cb5_JaffaCakes118
-
Size
133KB
-
MD5
4d478c33b8134fa3553362d1d9648cb5
-
SHA1
7204c708eecf449af04acaa9537e4bfeea625e13
-
SHA256
fa9052ec297d39514aec2cdbdf04a5bb53e0e8a67760070e56e09e43d4acf738
-
SHA512
3c6491b657ea4302d499b646f49189ed3bdc7f605ac33155f72d0408bda6f749a58eb932a7ac1c5c1ad11c0f7b49db761cdcd884b829bb2caaabdd2e03d75e3c
-
SSDEEP
3072:A77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8q3DdUL3MsN0a:A77HUUUUUUUUUUUUUUUUUUUT52VkhUcW
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-