General
-
Target
e98c16cc48588fffc177f1643bd8f285_JaffaCakes118
-
Size
1.1MB
-
Sample
240918-t7syfasbrn
-
MD5
e98c16cc48588fffc177f1643bd8f285
-
SHA1
f98d5953c1fd8c2edefb73705af9ae68826b8e3e
-
SHA256
c8f4215c2f4fd603d7051c110d956c5b03548d6c4a660bc96b0008d552d50a49
-
SHA512
d2d3fe0a7d213e1231765cf6e3b773c7b8fd727df5938d62b6aa5a604a8a35cf7dd6fc926ce9879b7f21657f8ee38ce7b299607e91132c5e2b7e4a6608a35fff
-
SSDEEP
24576:5RmJkqoQrilOIQ+yMxGafZW+f5guBG3fFi:uJXoQryTiMxGafZWmzBoi
Static task
static1
Behavioral task
behavioral1
Sample
e98c16cc48588fffc177f1643bd8f285_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
e98c16cc48588fffc177f1643bd8f285_JaffaCakes118
-
Size
1.1MB
-
MD5
e98c16cc48588fffc177f1643bd8f285
-
SHA1
f98d5953c1fd8c2edefb73705af9ae68826b8e3e
-
SHA256
c8f4215c2f4fd603d7051c110d956c5b03548d6c4a660bc96b0008d552d50a49
-
SHA512
d2d3fe0a7d213e1231765cf6e3b773c7b8fd727df5938d62b6aa5a604a8a35cf7dd6fc926ce9879b7f21657f8ee38ce7b299607e91132c5e2b7e4a6608a35fff
-
SSDEEP
24576:5RmJkqoQrilOIQ+yMxGafZW+f5guBG3fFi:uJXoQryTiMxGafZWmzBoi
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-