General
-
Target
9328f18144fffc9828e5f2dac89c02c4_JaffaCakes118
-
Size
3.8MB
-
Sample
240604-azv82sfg76
-
MD5
9328f18144fffc9828e5f2dac89c02c4
-
SHA1
bb418e404198e453d4833020f8b8bffb36344905
-
SHA256
ea6efdd79c60f1ad0332020a81be256a54fae294faf32bef92a646fcafe3098d
-
SHA512
8d8644cbf0b5052e6cafbcf63941081a57f94453c82e3f07523531ca185ce648d6b0f7ee7398768b6bbbb1a03072d831d2d21513564a542f11b329b016d9de2d
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPd/:uZHrzyG+2aDHGkS8Ch
Behavioral task
behavioral1
Sample
9328f18144fffc9828e5f2dac89c02c4_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
9328f18144fffc9828e5f2dac89c02c4_JaffaCakes118
-
Size
3.8MB
-
MD5
9328f18144fffc9828e5f2dac89c02c4
-
SHA1
bb418e404198e453d4833020f8b8bffb36344905
-
SHA256
ea6efdd79c60f1ad0332020a81be256a54fae294faf32bef92a646fcafe3098d
-
SHA512
8d8644cbf0b5052e6cafbcf63941081a57f94453c82e3f07523531ca185ce648d6b0f7ee7398768b6bbbb1a03072d831d2d21513564a542f11b329b016d9de2d
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPd/:uZHrzyG+2aDHGkS8Ch
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-