General
-
Target
3208da63f2d100d137ad14aa3ca1372c_JaffaCakes118
-
Size
211KB
-
Sample
240709-z9xbjawgqp
-
MD5
3208da63f2d100d137ad14aa3ca1372c
-
SHA1
a4fc695d51fceee6ca8ea71b720428e38bced179
-
SHA256
9d6fcabeb937d988915ad3aea4231da6d925bb6973b7214c69e6fb7532fc1100
-
SHA512
f9a5a68f441779bab5e64eb15ea11399e548f7577350d954d16df38393323677ee3b7e5cf4265f69bef9f23ffaec9b1d2e6a230f9c3348c21a038813f50e9f07
-
SSDEEP
3072:JEUP0Fx0k4MWJjFalEadi1W0cVp86ppGeuW13PVn3F5VN4BF6dm5MBe:anXXULse
Behavioral task
behavioral1
Sample
3208da63f2d100d137ad14aa3ca1372c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3208da63f2d100d137ad14aa3ca1372c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
3208da63f2d100d137ad14aa3ca1372c_JaffaCakes118
-
Size
211KB
-
MD5
3208da63f2d100d137ad14aa3ca1372c
-
SHA1
a4fc695d51fceee6ca8ea71b720428e38bced179
-
SHA256
9d6fcabeb937d988915ad3aea4231da6d925bb6973b7214c69e6fb7532fc1100
-
SHA512
f9a5a68f441779bab5e64eb15ea11399e548f7577350d954d16df38393323677ee3b7e5cf4265f69bef9f23ffaec9b1d2e6a230f9c3348c21a038813f50e9f07
-
SSDEEP
3072:JEUP0Fx0k4MWJjFalEadi1W0cVp86ppGeuW13PVn3F5VN4BF6dm5MBe:anXXULse
Score7/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-