General
-
Target
a70c3fe487ca16151b5b1188754e9497_JaffaCakes118
-
Size
4.7MB
-
Sample
240613-26qexsybpl
-
MD5
a70c3fe487ca16151b5b1188754e9497
-
SHA1
357810fe7cabd23fb8476cf23b320d6710d8f9c8
-
SHA256
1c090796b621306f2b0fe73a3592bacdb2777db9053409cf0fab4faa2b92fca2
-
SHA512
7b89a394045d49985cf0a49f1d0fb28927ac48cc8cf9f5f8c7fb7435ec7bbb06c43c130103cc0876c1cbfcc351617785dccba2430968c97d5eeb8e3dc13bac48
-
SSDEEP
98304:Tl88udp4A2evUNGnVuUwGLVWy0/OQmjmUah6rpHDR:yzDiNyiXfGDvn
Behavioral task
behavioral1
Sample
a70c3fe487ca16151b5b1188754e9497_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
a70c3fe487ca16151b5b1188754e9497_JaffaCakes118
-
Size
4.7MB
-
MD5
a70c3fe487ca16151b5b1188754e9497
-
SHA1
357810fe7cabd23fb8476cf23b320d6710d8f9c8
-
SHA256
1c090796b621306f2b0fe73a3592bacdb2777db9053409cf0fab4faa2b92fca2
-
SHA512
7b89a394045d49985cf0a49f1d0fb28927ac48cc8cf9f5f8c7fb7435ec7bbb06c43c130103cc0876c1cbfcc351617785dccba2430968c97d5eeb8e3dc13bac48
-
SSDEEP
98304:Tl88udp4A2evUNGnVuUwGLVWy0/OQmjmUah6rpHDR:yzDiNyiXfGDvn
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-