General
-
Target
71da70a56ee2c792240bcb0927821db2_JaffaCakes118
-
Size
178KB
-
Sample
240525-nzxzjafh5y
-
MD5
71da70a56ee2c792240bcb0927821db2
-
SHA1
6109050b8369fe304438e24a896f8e417bd84103
-
SHA256
3dfecc1f6208095356a0440c48fe665bad8538ca6908a092c49024cfd6fca024
-
SHA512
840decaeb6e79e7e9b22f7e7357d225ed82a1d87efa46d352e63c3ff9370122c3529d6bd5b649b9a70ef123b9ee4e1efafb504d111812310e8d0977aba152771
-
SSDEEP
3072:1DNPL/bEBEprt1uRz9yUPQUHUQfRQBAhb4piYDXX:1DFLTEBEppq9zPPHXfWBAhsQ+
Static task
static1
Behavioral task
behavioral1
Sample
71da70a56ee2c792240bcb0927821db2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
71da70a56ee2c792240bcb0927821db2_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
smokeloader
upd1
Targets
-
-
Target
71da70a56ee2c792240bcb0927821db2_JaffaCakes118
-
Size
178KB
-
MD5
71da70a56ee2c792240bcb0927821db2
-
SHA1
6109050b8369fe304438e24a896f8e417bd84103
-
SHA256
3dfecc1f6208095356a0440c48fe665bad8538ca6908a092c49024cfd6fca024
-
SHA512
840decaeb6e79e7e9b22f7e7357d225ed82a1d87efa46d352e63c3ff9370122c3529d6bd5b649b9a70ef123b9ee4e1efafb504d111812310e8d0977aba152771
-
SSDEEP
3072:1DNPL/bEBEprt1uRz9yUPQUHUQfRQBAhb4piYDXX:1DFLTEBEppq9zPPHXfWBAhsQ+
Score10/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-