General
-
Target
d13b1594bf3131439960679847deafd5_JaffaCakes118
-
Size
695KB
-
Sample
240907-gpp3lsyaql
-
MD5
d13b1594bf3131439960679847deafd5
-
SHA1
ade9dfd09c222d4c44c7a1580a2e6fa8ff7f4752
-
SHA256
fbdf8d3c34804ee8b85c721e9ab297d7a4f83a7c24c16d602820d40b6f7896e3
-
SHA512
00541f6ff42ea82edad8da937ce58b169556fdbf3c0dce23fff8902ab0aaca8654106f9b22f3ee9af0884aeb90f249cc82650f546382c2f2e966869622832f63
-
SSDEEP
12288:vYQzgc7nLXYQzgc7sjjkArEN249AyE/rbaMct4bO2/VMvfUwe7ctr:vfgc7nLXfgc7soFE//Tct4bOsCfk7cN
Static task
static1
Behavioral task
behavioral1
Sample
d13b1594bf3131439960679847deafd5_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d13b1594bf3131439960679847deafd5_JaffaCakes118
-
Size
695KB
-
MD5
d13b1594bf3131439960679847deafd5
-
SHA1
ade9dfd09c222d4c44c7a1580a2e6fa8ff7f4752
-
SHA256
fbdf8d3c34804ee8b85c721e9ab297d7a4f83a7c24c16d602820d40b6f7896e3
-
SHA512
00541f6ff42ea82edad8da937ce58b169556fdbf3c0dce23fff8902ab0aaca8654106f9b22f3ee9af0884aeb90f249cc82650f546382c2f2e966869622832f63
-
SSDEEP
12288:vYQzgc7nLXYQzgc7sjjkArEN249AyE/rbaMct4bO2/VMvfUwe7ctr:vfgc7nLXfgc7soFE//Tct4bOsCfk7cN
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-