General
-
Target
1c6355c45e08c13646e47dafcb66690e_JaffaCakes118
-
Size
536KB
-
Sample
240701-y8hw3sxfph
-
MD5
1c6355c45e08c13646e47dafcb66690e
-
SHA1
028c8693ae345438e819c1e0d3a81a85f1fdb648
-
SHA256
a09bc116716bdf5d7a26f94106ff9f4c8782c8e6fb92d67c5a5dd39ff925dbba
-
SHA512
6220adf6d0d6c8090b9a460c80cc364606df614646c6d962cd4be93936194607b977547db043b24b35e650391204fec9ce3415426282aab6bba94c8727752b07
-
SSDEEP
6144:Wl5Gq/tX+pd1bEz2s7ETRhEgFJE/C33I5:WbGq/tX+pd167QhEQE/43+
Static task
static1
Behavioral task
behavioral1
Sample
1c6355c45e08c13646e47dafcb66690e_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1c6355c45e08c13646e47dafcb66690e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
1c6355c45e08c13646e47dafcb66690e_JaffaCakes118
-
Size
536KB
-
MD5
1c6355c45e08c13646e47dafcb66690e
-
SHA1
028c8693ae345438e819c1e0d3a81a85f1fdb648
-
SHA256
a09bc116716bdf5d7a26f94106ff9f4c8782c8e6fb92d67c5a5dd39ff925dbba
-
SHA512
6220adf6d0d6c8090b9a460c80cc364606df614646c6d962cd4be93936194607b977547db043b24b35e650391204fec9ce3415426282aab6bba94c8727752b07
-
SSDEEP
6144:Wl5Gq/tX+pd1bEz2s7ETRhEgFJE/C33I5:WbGq/tX+pd167QhEQE/43+
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-