General
-
Target
aab48aacd74626582a2694028bd90410_JaffaCakes118
-
Size
3.4MB
-
Sample
240614-t4bjzsyclf
-
MD5
aab48aacd74626582a2694028bd90410
-
SHA1
73c45fa727d536ac8529e6396cc665e494e299cc
-
SHA256
6fc0a0b76a712172917898c1c99ce45e6f3e8c27b6dc0b1bfdb94d3cb1c4574e
-
SHA512
1406f60d632cffcda77b18349b45666f830ba70b57e2254c2dca00331592e63e84e978f782115702af4411642470f4bcd58ed68f0a2c7bd68c45ece148c7b67c
-
SSDEEP
98304:Bzr0juFriv+ys5laVQtuu6wiyj42u4zSeSTnT:VuWzHwE9LiyDiT
Behavioral task
behavioral1
Sample
aab48aacd74626582a2694028bd90410_JaffaCakes118.exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
aab48aacd74626582a2694028bd90410_JaffaCakes118
-
Size
3.4MB
-
MD5
aab48aacd74626582a2694028bd90410
-
SHA1
73c45fa727d536ac8529e6396cc665e494e299cc
-
SHA256
6fc0a0b76a712172917898c1c99ce45e6f3e8c27b6dc0b1bfdb94d3cb1c4574e
-
SHA512
1406f60d632cffcda77b18349b45666f830ba70b57e2254c2dca00331592e63e84e978f782115702af4411642470f4bcd58ed68f0a2c7bd68c45ece148c7b67c
-
SSDEEP
98304:Bzr0juFriv+ys5laVQtuu6wiyj42u4zSeSTnT:VuWzHwE9LiyDiT
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-