General
-
Target
6960bf222a218348727ce622f586e0f8_JaffaCakes118
-
Size
6.6MB
-
Sample
240523-cfkpbahh65
-
MD5
6960bf222a218348727ce622f586e0f8
-
SHA1
62ca3d7ec819bfbaa2e55bf150f05cab8418e641
-
SHA256
e0ed7c1abd8da361ac41e071b028b3753e753d0cc8cd5cc027a0a30eb76d3640
-
SHA512
699990379be968e8bb35284fc44fb74b2643b34f8a4e7559be97bc27ba8d37c58b06695eddc41fe520981e104f7efdc04e56b919ed7e9bf36d7b7cf3d5a9ef74
-
SSDEEP
98304:sLOoYf4N/afGLqagIxcnHSHphb9VcEClPlHZOK3ntC1wz2HNlf7t7u/Kjulr+Ip0:s9YfO3DcnHSTOltH04w1XHXj4/Bs
Behavioral task
behavioral1
Sample
6960bf222a218348727ce622f586e0f8_JaffaCakes118.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
6960bf222a218348727ce622f586e0f8_JaffaCakes118
-
Size
6.6MB
-
MD5
6960bf222a218348727ce622f586e0f8
-
SHA1
62ca3d7ec819bfbaa2e55bf150f05cab8418e641
-
SHA256
e0ed7c1abd8da361ac41e071b028b3753e753d0cc8cd5cc027a0a30eb76d3640
-
SHA512
699990379be968e8bb35284fc44fb74b2643b34f8a4e7559be97bc27ba8d37c58b06695eddc41fe520981e104f7efdc04e56b919ed7e9bf36d7b7cf3d5a9ef74
-
SSDEEP
98304:sLOoYf4N/afGLqagIxcnHSHphb9VcEClPlHZOK3ntC1wz2HNlf7t7u/Kjulr+Ip0:s9YfO3DcnHSTOltH04w1XHXj4/Bs
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-