General
-
Target
dcc91b786af6d5e98862cdbf7c1b32c4_JaffaCakes118
-
Size
3.8MB
-
Sample
240912-wvyn9sxdjc
-
MD5
dcc91b786af6d5e98862cdbf7c1b32c4
-
SHA1
f27d0f09dd39ba23e334126e9407f8558bf2b0c0
-
SHA256
f015be3e959f74410712a5cbb42bacda0623b6433c8ab00b4a29319bdece0354
-
SHA512
d8181ca27becfbd8a61b3ae64287de83d00375834d4a59de5e5feeb9c137abd751e0bacd3ff0589ac10a1bbbb4e21020af8f0921216aee0f4af4dd13f736fb9c
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdz:uZHrzyG+2aDHGkS8C1
Behavioral task
behavioral1
Sample
dcc91b786af6d5e98862cdbf7c1b32c4_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
dcc91b786af6d5e98862cdbf7c1b32c4_JaffaCakes118
-
Size
3.8MB
-
MD5
dcc91b786af6d5e98862cdbf7c1b32c4
-
SHA1
f27d0f09dd39ba23e334126e9407f8558bf2b0c0
-
SHA256
f015be3e959f74410712a5cbb42bacda0623b6433c8ab00b4a29319bdece0354
-
SHA512
d8181ca27becfbd8a61b3ae64287de83d00375834d4a59de5e5feeb9c137abd751e0bacd3ff0589ac10a1bbbb4e21020af8f0921216aee0f4af4dd13f736fb9c
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdz:uZHrzyG+2aDHGkS8C1
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-