General
-
Target
aca3fc933ae1ed76774f179eed5457e3_JaffaCakes118
-
Size
187KB
-
Sample
240819-z88ceazhkk
-
MD5
aca3fc933ae1ed76774f179eed5457e3
-
SHA1
bd1df9ce16ba75b6c6ffd6a63746d37ff0bd34b2
-
SHA256
492c576f452329f0806a2460e9da89cf8e596e593d87beb991ecdacaac0563cf
-
SHA512
35bacc7db21a51f34dfc561e79d1dc7ab20da8e1522fc5367590cb09a62b1e2ddf80cecc386cd198ea0207cf0894516412667a05b862abdff19897403fb9ecbd
-
SSDEEP
3072:RwDaFQ0DmaOKjcB86nXloQGRnagHnbaYBp0ktuh20wxrZ9Gg1YUpjKKX/WIYr:1aYM9Xl8RLHnb5Bp/uuV1Z/Mr
Static task
static1
Behavioral task
behavioral1
Sample
aca3fc933ae1ed76774f179eed5457e3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aca3fc933ae1ed76774f179eed5457e3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
aca3fc933ae1ed76774f179eed5457e3_JaffaCakes118
-
Size
187KB
-
MD5
aca3fc933ae1ed76774f179eed5457e3
-
SHA1
bd1df9ce16ba75b6c6ffd6a63746d37ff0bd34b2
-
SHA256
492c576f452329f0806a2460e9da89cf8e596e593d87beb991ecdacaac0563cf
-
SHA512
35bacc7db21a51f34dfc561e79d1dc7ab20da8e1522fc5367590cb09a62b1e2ddf80cecc386cd198ea0207cf0894516412667a05b862abdff19897403fb9ecbd
-
SSDEEP
3072:RwDaFQ0DmaOKjcB86nXloQGRnagHnbaYBp0ktuh20wxrZ9Gg1YUpjKKX/WIYr:1aYM9Xl8RLHnb5Bp/uuV1Z/Mr
Score7/10-
Deletes itself
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-