General
-
Target
7a45a317b215a5fc4907d1828c9f1263_JaffaCakes118
-
Size
3.8MB
-
Sample
240527-yaqt2afd5s
-
MD5
7a45a317b215a5fc4907d1828c9f1263
-
SHA1
f15926eb2210f91e47941b7e5aebc1c02cbc2bd1
-
SHA256
16d8c519fbaaef894b9093ccdb77a7d1becf9d00607349b8e0587efc6f01e213
-
SHA512
7b48cc19be805f2ff1f3928ad255d60434dfdec20f65ae0be6c8b09d965099b667fbb0f88a72b1962b6cc80007dc3a585bb4bd9305ac797e620edd94761c4976
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdG:uZHrzyG+2aDHGkS8Cg
Behavioral task
behavioral1
Sample
7a45a317b215a5fc4907d1828c9f1263_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
7a45a317b215a5fc4907d1828c9f1263_JaffaCakes118
-
Size
3.8MB
-
MD5
7a45a317b215a5fc4907d1828c9f1263
-
SHA1
f15926eb2210f91e47941b7e5aebc1c02cbc2bd1
-
SHA256
16d8c519fbaaef894b9093ccdb77a7d1becf9d00607349b8e0587efc6f01e213
-
SHA512
7b48cc19be805f2ff1f3928ad255d60434dfdec20f65ae0be6c8b09d965099b667fbb0f88a72b1962b6cc80007dc3a585bb4bd9305ac797e620edd94761c4976
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdG:uZHrzyG+2aDHGkS8Cg
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-