General
-
Target
f03a28391fda1b0355dc946865c88297_JaffaCakes118
-
Size
3.8MB
-
Sample
240921-vb93hstakm
-
MD5
f03a28391fda1b0355dc946865c88297
-
SHA1
4d51f6fa44decac766168997ab3dfe25856077e8
-
SHA256
d814b87300f2a2ee57ce214b6d266ed5de6710bfd11fbd87985419d4c28fef3a
-
SHA512
5f91d71422147a71a31fe937ac4c51f98886c16eb34c44c13cbd53a767b39abb18986defd0667ace0dff15d706f9b21e265b5714245cb43f58e8942404d0c134
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdg:uZHrzyG+2aDHGkS8C+
Behavioral task
behavioral1
Sample
f03a28391fda1b0355dc946865c88297_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f03a28391fda1b0355dc946865c88297_JaffaCakes118
-
Size
3.8MB
-
MD5
f03a28391fda1b0355dc946865c88297
-
SHA1
4d51f6fa44decac766168997ab3dfe25856077e8
-
SHA256
d814b87300f2a2ee57ce214b6d266ed5de6710bfd11fbd87985419d4c28fef3a
-
SHA512
5f91d71422147a71a31fe937ac4c51f98886c16eb34c44c13cbd53a767b39abb18986defd0667ace0dff15d706f9b21e265b5714245cb43f58e8942404d0c134
-
SSDEEP
98304:uZuarCtWyX0p+tUFHtrXCDHGkSn8b+vPdg:uZHrzyG+2aDHGkS8C+
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-