General
-
Target
b42aa1151c4d44549614465ed4eb6a0c_JaffaCakes118
-
Size
7.1MB
-
Sample
240616-sllrkascmj
-
MD5
b42aa1151c4d44549614465ed4eb6a0c
-
SHA1
458b1f8a1db746991a6fec1f2a0b6f50a275d744
-
SHA256
6bf3b3b28f0fba44aca9208ee2bc5c0c8ca4d65164b465abd59408f45218adf0
-
SHA512
13a8218e4dcb565ee191041faf647c3f56e9fe7b6cd5c97ced94f229262467b92fc2f18b47a0032e3a77046cd1b2c74c80f33ae65230dd616023313ea63611b6
-
SSDEEP
196608:Me6P9aFJFoPveiLSEVXSa+V6WlTUXHjWm:Me6PsFJF07LSE19+V65XDWm
Behavioral task
behavioral1
Sample
b42aa1151c4d44549614465ed4eb6a0c_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
b42aa1151c4d44549614465ed4eb6a0c_JaffaCakes118
-
Size
7.1MB
-
MD5
b42aa1151c4d44549614465ed4eb6a0c
-
SHA1
458b1f8a1db746991a6fec1f2a0b6f50a275d744
-
SHA256
6bf3b3b28f0fba44aca9208ee2bc5c0c8ca4d65164b465abd59408f45218adf0
-
SHA512
13a8218e4dcb565ee191041faf647c3f56e9fe7b6cd5c97ced94f229262467b92fc2f18b47a0032e3a77046cd1b2c74c80f33ae65230dd616023313ea63611b6
-
SSDEEP
196608:Me6P9aFJFoPveiLSEVXSa+V6WlTUXHjWm:Me6PsFJF07LSE19+V65XDWm
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-