General
-
Target
f08f9c357a14640af9a3b33c39ace6a9_JaffaCakes118
-
Size
810KB
-
Sample
240921-zb9h7ssbpg
-
MD5
f08f9c357a14640af9a3b33c39ace6a9
-
SHA1
95feeabf8aef1a69f60cad2fa39ec869d4bd61dc
-
SHA256
39a664e0cd0d93951014aeb63b10aa3fdf91dcc10a4f35fa1b70d4c28f6fc628
-
SHA512
466b533031bc4730f7554eb8f2c22abed28de36eaa95b946b210ce5e5f0e662586a6f0364412f042b79944e1a900ecf65ebd44a151c76bcf60b9bcf8018060b6
-
SSDEEP
24576:5t+SLEXI2CK2H7Wb4Ke1atRkXo9EfJzOMuZm+:5Y02CKi1zX4EfJOMu0+
Static task
static1
Behavioral task
behavioral1
Sample
f08f9c357a14640af9a3b33c39ace6a9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f08f9c357a14640af9a3b33c39ace6a9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
f08f9c357a14640af9a3b33c39ace6a9_JaffaCakes118
-
Size
810KB
-
MD5
f08f9c357a14640af9a3b33c39ace6a9
-
SHA1
95feeabf8aef1a69f60cad2fa39ec869d4bd61dc
-
SHA256
39a664e0cd0d93951014aeb63b10aa3fdf91dcc10a4f35fa1b70d4c28f6fc628
-
SHA512
466b533031bc4730f7554eb8f2c22abed28de36eaa95b946b210ce5e5f0e662586a6f0364412f042b79944e1a900ecf65ebd44a151c76bcf60b9bcf8018060b6
-
SSDEEP
24576:5t+SLEXI2CK2H7Wb4Ke1atRkXo9EfJzOMuZm+:5Y02CKi1zX4EfJOMu0+
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-