General
-
Target
JaffaCakes118_0750cdec3fbe808ebc2803130d173b50
-
Size
22KB
-
Sample
250520-wkzhta1kt2
-
MD5
0750cdec3fbe808ebc2803130d173b50
-
SHA1
a1c4c51c7450891cb84cbf0dfbe713c4ff604aae
-
SHA256
6fbf97ccf59de2eccd256f25bc506ecb9000749a05d7db022e83743a6e7f2a8a
-
SHA512
fd0ec29a01214b9ecc33e65e9fb66a39983f44cc85d51edff0c3257ceecda2bd6ad0c2e0e0eb757cd1bdec9e4448b6d1522580c4559d1e1c9221648a37cd0b4b
-
SSDEEP
384:/iH3ntp7c14eCAAxTWbD3+35dutNxt/ZtNNTdwRB9CZnER:/+treb+WbDBxllNTdwR/j
Behavioral task
behavioral1
Sample
JaffaCakes118_0750cdec3fbe808ebc2803130d173b50.docm
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0750cdec3fbe808ebc2803130d173b50.docm
Resource
win11-20250502-en
Malware Config
Extracted
http://80.158.33.0:443/powershell.txt
Targets
-
-
Target
JaffaCakes118_0750cdec3fbe808ebc2803130d173b50
-
Size
22KB
-
MD5
0750cdec3fbe808ebc2803130d173b50
-
SHA1
a1c4c51c7450891cb84cbf0dfbe713c4ff604aae
-
SHA256
6fbf97ccf59de2eccd256f25bc506ecb9000749a05d7db022e83743a6e7f2a8a
-
SHA512
fd0ec29a01214b9ecc33e65e9fb66a39983f44cc85d51edff0c3257ceecda2bd6ad0c2e0e0eb757cd1bdec9e4448b6d1522580c4559d1e1c9221648a37cd0b4b
-
SSDEEP
384:/iH3ntp7c14eCAAxTWbD3+35dutNxt/ZtNNTdwRB9CZnER:/+treb+WbDBxllNTdwR/j
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-