General
-
Target
b493212bd29d83af67a647898178f6f4_JaffaCakes118
-
Size
116KB
-
Sample
240821-w85dzatfrd
-
MD5
b493212bd29d83af67a647898178f6f4
-
SHA1
116a73ae08f5979a61e97b4bcb9ce3cd566e8f4f
-
SHA256
9725b8773fd86bd8168e0af1247a7215743bf6ca2d706ed412d98854284ce299
-
SHA512
eb0c345272225ae3616c46611c156bbb26c9b686e3e4480c59704ff35ea20dcf53067137966e1e3979c58b2a4fa10f1c5ebec474d69fab6cac5b4e955c36f31e
-
SSDEEP
3072:eh1XEBGZTqamcE/P4h0uIe7S/I/Hhj4Qxr7:EO/Q7IDQJkQxr
Behavioral task
behavioral1
Sample
b493212bd29d83af67a647898178f6f4_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
b493212bd29d83af67a647898178f6f4_JaffaCakes118
-
Size
116KB
-
MD5
b493212bd29d83af67a647898178f6f4
-
SHA1
116a73ae08f5979a61e97b4bcb9ce3cd566e8f4f
-
SHA256
9725b8773fd86bd8168e0af1247a7215743bf6ca2d706ed412d98854284ce299
-
SHA512
eb0c345272225ae3616c46611c156bbb26c9b686e3e4480c59704ff35ea20dcf53067137966e1e3979c58b2a4fa10f1c5ebec474d69fab6cac5b4e955c36f31e
-
SSDEEP
3072:eh1XEBGZTqamcE/P4h0uIe7S/I/Hhj4Qxr7:EO/Q7IDQJkQxr
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-