General
-
Target
0ab1f7621e9a11989a450cb6b0db3289_JaffaCakes118
-
Size
183KB
-
Sample
240624-y9nhysvcjp
-
MD5
0ab1f7621e9a11989a450cb6b0db3289
-
SHA1
8f270c07feef6afc76e8f510a323604db8aaf4d0
-
SHA256
548b315988bb1bfe00b7dae565cd3c10dcf62fc929fecba0667cbbcf4cf7c553
-
SHA512
f98e28f21253ecf7ce04c07851908b72dfcfad809ccf414085621d518982c015aa8e94fb15a9eccce39f1f3a9b1c0bb03b3c54fda8345386f1386947eb1686e5
-
SSDEEP
3072:Icmq9eUUzHm8+qCPRDpGb1PgCWWkJRXtDhM4d8hzGlbP:b96zFc5DpGZPKWGRXRhMhA
Static task
static1
Behavioral task
behavioral1
Sample
0ab1f7621e9a11989a450cb6b0db3289_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0ab1f7621e9a11989a450cb6b0db3289_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
0ab1f7621e9a11989a450cb6b0db3289_JaffaCakes118
-
Size
183KB
-
MD5
0ab1f7621e9a11989a450cb6b0db3289
-
SHA1
8f270c07feef6afc76e8f510a323604db8aaf4d0
-
SHA256
548b315988bb1bfe00b7dae565cd3c10dcf62fc929fecba0667cbbcf4cf7c553
-
SHA512
f98e28f21253ecf7ce04c07851908b72dfcfad809ccf414085621d518982c015aa8e94fb15a9eccce39f1f3a9b1c0bb03b3c54fda8345386f1386947eb1686e5
-
SSDEEP
3072:Icmq9eUUzHm8+qCPRDpGb1PgCWWkJRXtDhM4d8hzGlbP:b96zFc5DpGZPKWGRXRhMhA
Score7/10-
Deletes itself
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Suspicious use of SetThreadContext
-