General
-
Target
9fc0a38d1e0e37918d8c0b677343d90e_JaffaCakes118
-
Size
3.8MB
-
Sample
240611-2edxtathrl
-
MD5
9fc0a38d1e0e37918d8c0b677343d90e
-
SHA1
0aa99f8b42bb3abc8caaa90bca865499bc8f3b35
-
SHA256
d29e764faaaa821dfe4edc0f1d6aed7b5b65762e834fc57da088e2124cdfaf2a
-
SHA512
05a8e3c4a2b2c3429d85e9c902d1f771b1c1a7dbb6bf363e67a09d0039893bb6065556b7afacfae9158412446fead4e7786f69bea291961f5d30650d2ba226ba
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdn:uZHrzyG+2aDHGkS8C1
Behavioral task
behavioral1
Sample
9fc0a38d1e0e37918d8c0b677343d90e_JaffaCakes118.exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
9fc0a38d1e0e37918d8c0b677343d90e_JaffaCakes118
-
Size
3.8MB
-
MD5
9fc0a38d1e0e37918d8c0b677343d90e
-
SHA1
0aa99f8b42bb3abc8caaa90bca865499bc8f3b35
-
SHA256
d29e764faaaa821dfe4edc0f1d6aed7b5b65762e834fc57da088e2124cdfaf2a
-
SHA512
05a8e3c4a2b2c3429d85e9c902d1f771b1c1a7dbb6bf363e67a09d0039893bb6065556b7afacfae9158412446fead4e7786f69bea291961f5d30650d2ba226ba
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdn:uZHrzyG+2aDHGkS8C1
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-