General
-
Target
18503b81136a94420f702854c52f879f_JaffaCakes118
-
Size
25KB
-
Sample
240628-bz7shswgpl
-
MD5
18503b81136a94420f702854c52f879f
-
SHA1
5282881c38a3669d152c8347524088a0dcd5ef91
-
SHA256
330824d8f1b80eadace6e90b16ab9f2860c5f788814720e12bb2eaf4cf2ddfbc
-
SHA512
3e70bee2f760b97ab921d97b6a365f547ae8b147cd18dede47f471477a3c09a16760c0fa3933befca6908d41952281803fe24f156683a956f3a2f1ef6f48593a
-
SSDEEP
768:vBhg7Ane/FDA6mBFHx8fCk2i1WplW5NNZSPy/:vwCv8LUvgvh
Behavioral task
behavioral1
Sample
18503b81136a94420f702854c52f879f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
18503b81136a94420f702854c52f879f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
18503b81136a94420f702854c52f879f_JaffaCakes118
-
Size
25KB
-
MD5
18503b81136a94420f702854c52f879f
-
SHA1
5282881c38a3669d152c8347524088a0dcd5ef91
-
SHA256
330824d8f1b80eadace6e90b16ab9f2860c5f788814720e12bb2eaf4cf2ddfbc
-
SHA512
3e70bee2f760b97ab921d97b6a365f547ae8b147cd18dede47f471477a3c09a16760c0fa3933befca6908d41952281803fe24f156683a956f3a2f1ef6f48593a
-
SSDEEP
768:vBhg7Ane/FDA6mBFHx8fCk2i1WplW5NNZSPy/:vwCv8LUvgvh
Score7/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-