General
-
Target
a5f7baf3742d36ea1c16bc4f8cd5965b_JaffaCakes118
-
Size
3.8MB
-
Sample
240613-rj5afsscpb
-
MD5
a5f7baf3742d36ea1c16bc4f8cd5965b
-
SHA1
d85e1c90621ae7163af86b653c4254248aa8aa21
-
SHA256
5be178f110fa79843ae18651960d68be1a6457f9d25b0429341df6de6702018c
-
SHA512
01988bbca8b6e6f5640c0dda3764c43fdc98daadccd75e4e1ddd0122acb46267f61305acc89382a2da7248637f521ffd30502f252521399ba120c6e2b0b7cb4a
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdr:uZHrzyG+2aDHGkS8CV
Behavioral task
behavioral1
Sample
a5f7baf3742d36ea1c16bc4f8cd5965b_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
a5f7baf3742d36ea1c16bc4f8cd5965b_JaffaCakes118
-
Size
3.8MB
-
MD5
a5f7baf3742d36ea1c16bc4f8cd5965b
-
SHA1
d85e1c90621ae7163af86b653c4254248aa8aa21
-
SHA256
5be178f110fa79843ae18651960d68be1a6457f9d25b0429341df6de6702018c
-
SHA512
01988bbca8b6e6f5640c0dda3764c43fdc98daadccd75e4e1ddd0122acb46267f61305acc89382a2da7248637f521ffd30502f252521399ba120c6e2b0b7cb4a
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdr:uZHrzyG+2aDHGkS8CV
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-