General
-
Target
9366914be461583ee2be15fbee518347_JaffaCakes118
-
Size
6.6MB
-
Sample
240604-c2eeesad8v
-
MD5
9366914be461583ee2be15fbee518347
-
SHA1
16dc51b2833dae149216d56b529cd55e1736ba2f
-
SHA256
df466315ecaeda2409986a3c2620774b5e89e6c73a4d348576c87afca323817e
-
SHA512
1bdc2f690ab3d3b731d3c78a4c0f0caf8b6655723bd2d095f33477b22e3f17d0cf3363187e2471fb30995db7c1adb34cbe9afbd7d8bd03366a18f42b785477b0
-
SSDEEP
98304:sLOoYf4N/afGLqagIxcnHSHphb9VcEClPlHZOK3ntC1wz2HNlf7t7u/Kjulr+Ip6:s9YfO3DcnHSTOltH04w1XHXj4/By
Behavioral task
behavioral1
Sample
9366914be461583ee2be15fbee518347_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
9366914be461583ee2be15fbee518347_JaffaCakes118
-
Size
6.6MB
-
MD5
9366914be461583ee2be15fbee518347
-
SHA1
16dc51b2833dae149216d56b529cd55e1736ba2f
-
SHA256
df466315ecaeda2409986a3c2620774b5e89e6c73a4d348576c87afca323817e
-
SHA512
1bdc2f690ab3d3b731d3c78a4c0f0caf8b6655723bd2d095f33477b22e3f17d0cf3363187e2471fb30995db7c1adb34cbe9afbd7d8bd03366a18f42b785477b0
-
SSDEEP
98304:sLOoYf4N/afGLqagIxcnHSHphb9VcEClPlHZOK3ntC1wz2HNlf7t7u/Kjulr+Ip6:s9YfO3DcnHSTOltH04w1XHXj4/By
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-