General
-
Target
81c36b059e1a6a1aca07cd37a28a02db_JaffaCakes118
-
Size
217KB
-
Sample
240801-zshrtazhqg
-
MD5
81c36b059e1a6a1aca07cd37a28a02db
-
SHA1
ec15ccfd6da7d837cc4cfabd7a59fd3c21d424ac
-
SHA256
f859131ad0bd17c647f2cb6c3eb31f334ff27ce825546f89ee443bf3e7d0823d
-
SHA512
689f572ca653c20a07bbe83f052a200ef706c2d03b9371425c29f1e69cde5f90a8e3ccd603b0e56694443e7ff7ee51e0c777fdad6918ec7f101915ef49fd37bd
-
SSDEEP
6144:yw2S2iMNBKx3HiKfjztUhzTuVfkfsn7J:yA3MoHXmfsfkfsn7J
Static task
static1
Behavioral task
behavioral1
Sample
81c36b059e1a6a1aca07cd37a28a02db_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81c36b059e1a6a1aca07cd37a28a02db_JaffaCakes118.exe
Resource
win10v2004-20240730-en
Malware Config
Targets
-
-
Target
81c36b059e1a6a1aca07cd37a28a02db_JaffaCakes118
-
Size
217KB
-
MD5
81c36b059e1a6a1aca07cd37a28a02db
-
SHA1
ec15ccfd6da7d837cc4cfabd7a59fd3c21d424ac
-
SHA256
f859131ad0bd17c647f2cb6c3eb31f334ff27ce825546f89ee443bf3e7d0823d
-
SHA512
689f572ca653c20a07bbe83f052a200ef706c2d03b9371425c29f1e69cde5f90a8e3ccd603b0e56694443e7ff7ee51e0c777fdad6918ec7f101915ef49fd37bd
-
SSDEEP
6144:yw2S2iMNBKx3HiKfjztUhzTuVfkfsn7J:yA3MoHXmfsfkfsn7J
Score7/10-
Deletes itself
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-