General
-
Target
353e474f7b4016813bbb462798fec64f_JaffaCakes118
-
Size
865KB
-
Sample
240710-sjf4asxapc
-
MD5
353e474f7b4016813bbb462798fec64f
-
SHA1
0464cc64c8e19e42765deeeae6e3f1a46c1ed9b9
-
SHA256
b95d3f837860a9458844193b1eb148f16865728200f62c2671ebf37644f57dff
-
SHA512
01395ed6cd1b6cfe3a81680bcbba907c99973f63bfe15c6010dc2f78a425fc9b28587d5268220595d39b5029c0d172931ed5b2f786a85d6509b563d48a2a24de
-
SSDEEP
24576:K/7//0x2mmB+i06g8oUsuE/pm3dw1ClFrg2Dt59e4Omb5/:gzBb06g8oj1/pmDH/59//
Static task
static1
Behavioral task
behavioral1
Sample
353e474f7b4016813bbb462798fec64f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
353e474f7b4016813bbb462798fec64f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
353e474f7b4016813bbb462798fec64f_JaffaCakes118
-
Size
865KB
-
MD5
353e474f7b4016813bbb462798fec64f
-
SHA1
0464cc64c8e19e42765deeeae6e3f1a46c1ed9b9
-
SHA256
b95d3f837860a9458844193b1eb148f16865728200f62c2671ebf37644f57dff
-
SHA512
01395ed6cd1b6cfe3a81680bcbba907c99973f63bfe15c6010dc2f78a425fc9b28587d5268220595d39b5029c0d172931ed5b2f786a85d6509b563d48a2a24de
-
SSDEEP
24576:K/7//0x2mmB+i06g8oUsuE/pm3dw1ClFrg2Dt59e4Omb5/:gzBb06g8oj1/pmDH/59//
Score10/10-
Detects PseudoManuscrypt payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
PseudoManuscrypt
PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Suspicious use of SetThreadContext
-