General
-
Target
a3cac8243d801b5a6b2e7f9da23e25a7_JaffaCakes118
-
Size
3.8MB
-
Sample
240613-etgwpaxelr
-
MD5
a3cac8243d801b5a6b2e7f9da23e25a7
-
SHA1
711ba652789d53d38005be2de54b85b80db95bb8
-
SHA256
cc18ba9fa0fe7b0e78f59209260b0a0ef9ba74337d47301cffed961965d0a536
-
SHA512
414d145f6b2892aa3a04cb649992aff6fb7ec30904a74826d88e52b8859c091cb0893e5e85c3d2dcf3a473df6c43917a07cd9e0fbbd64255fb1b7845fd6daf6e
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPd7:uZHrzyG+2aDHGkS8C1
Behavioral task
behavioral1
Sample
a3cac8243d801b5a6b2e7f9da23e25a7_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
a3cac8243d801b5a6b2e7f9da23e25a7_JaffaCakes118
-
Size
3.8MB
-
MD5
a3cac8243d801b5a6b2e7f9da23e25a7
-
SHA1
711ba652789d53d38005be2de54b85b80db95bb8
-
SHA256
cc18ba9fa0fe7b0e78f59209260b0a0ef9ba74337d47301cffed961965d0a536
-
SHA512
414d145f6b2892aa3a04cb649992aff6fb7ec30904a74826d88e52b8859c091cb0893e5e85c3d2dcf3a473df6c43917a07cd9e0fbbd64255fb1b7845fd6daf6e
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPd7:uZHrzyG+2aDHGkS8C1
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-