General
-
Target
a42c9db84f335cee1488cdd453178548_JaffaCakes118
-
Size
3.8MB
-
Sample
240613-g3122axcjd
-
MD5
a42c9db84f335cee1488cdd453178548
-
SHA1
9ac96a21e26e51aa6692b650a2c2da55b2d11104
-
SHA256
6f77b0fe9f7d2f93be95ecc795fa4c595a94412fdc653564d0ddeb18a0076fab
-
SHA512
7d9eaabaccda79f460983731ca93e7677021245bcb69c6bab320581d8f2b62832e77205b7c3163bc99018c164597e0e9549535911b7aa383ce2c41435256aefc
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdu:uZHrzyG+2aDHGkS8Cs
Behavioral task
behavioral1
Sample
a42c9db84f335cee1488cdd453178548_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
a42c9db84f335cee1488cdd453178548_JaffaCakes118
-
Size
3.8MB
-
MD5
a42c9db84f335cee1488cdd453178548
-
SHA1
9ac96a21e26e51aa6692b650a2c2da55b2d11104
-
SHA256
6f77b0fe9f7d2f93be95ecc795fa4c595a94412fdc653564d0ddeb18a0076fab
-
SHA512
7d9eaabaccda79f460983731ca93e7677021245bcb69c6bab320581d8f2b62832e77205b7c3163bc99018c164597e0e9549535911b7aa383ce2c41435256aefc
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdu:uZHrzyG+2aDHGkS8Cs
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-