General
-
Target
54a34d37db59c9a4ef04ac527817d180_JaffaCakes118
-
Size
1.0MB
-
Sample
240717-y5klhaxckj
-
MD5
54a34d37db59c9a4ef04ac527817d180
-
SHA1
05ce4c697b9ee3fa0ee2c38573fe12485916be0b
-
SHA256
295db6a7b3d371ff7376714cbd5b17a5184efc95106b2b36a4dc103955651f0d
-
SHA512
8a37ec67ef2d13c146ca7c0d0a05652458ab8562f30029f962ecee08dcbcd35d734330c5f0a907f7b3e06f047734bc36e7ef9b77c6b3c1c264eb7e07bdce7794
-
SSDEEP
24576:1WJFGOoP6jMm4FS07UAm4MWL+w+Aq/2RyigLuV9g1x:uEm4FstrWP3yVUe
Static task
static1
Behavioral task
behavioral1
Sample
54a34d37db59c9a4ef04ac527817d180_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
54a34d37db59c9a4ef04ac527817d180_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
latentbot
deuscrypter.zapto.org
Targets
-
-
Target
54a34d37db59c9a4ef04ac527817d180_JaffaCakes118
-
Size
1.0MB
-
MD5
54a34d37db59c9a4ef04ac527817d180
-
SHA1
05ce4c697b9ee3fa0ee2c38573fe12485916be0b
-
SHA256
295db6a7b3d371ff7376714cbd5b17a5184efc95106b2b36a4dc103955651f0d
-
SHA512
8a37ec67ef2d13c146ca7c0d0a05652458ab8562f30029f962ecee08dcbcd35d734330c5f0a907f7b3e06f047734bc36e7ef9b77c6b3c1c264eb7e07bdce7794
-
SSDEEP
24576:1WJFGOoP6jMm4FS07UAm4MWL+w+Aq/2RyigLuV9g1x:uEm4FstrWP3yVUe
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-