General
-
Target
ff2107f6c1c9944eb8786e29b4d33bd8_JaffaCakes118
-
Size
280KB
-
Sample
240929-w7glhsyfph
-
MD5
ff2107f6c1c9944eb8786e29b4d33bd8
-
SHA1
4222dce5474016822cd0dab6293c0f11b88a330d
-
SHA256
3c1dc0ded20bd442128682872cbe2679b6d1dde1896805ec7d16f8f009ba5525
-
SHA512
e45f06676e9b24a5b4273c882043d922408954eeff4775f5c31e2699005ec67911b05c8096b50f38feec23bf474e5e2f33984f465daef8d3b1e85d71a0d14ba0
-
SSDEEP
6144:mwYp93UiKXkpvcEkFJ79gMXWuRGw+6tXGM/zJ1HthtYrXCPl:qUQpvcEGx9gM3P+6tXNrJ1NSy9
Static task
static1
Behavioral task
behavioral1
Sample
ff2107f6c1c9944eb8786e29b4d33bd8_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ff2107f6c1c9944eb8786e29b4d33bd8_JaffaCakes118
-
Size
280KB
-
MD5
ff2107f6c1c9944eb8786e29b4d33bd8
-
SHA1
4222dce5474016822cd0dab6293c0f11b88a330d
-
SHA256
3c1dc0ded20bd442128682872cbe2679b6d1dde1896805ec7d16f8f009ba5525
-
SHA512
e45f06676e9b24a5b4273c882043d922408954eeff4775f5c31e2699005ec67911b05c8096b50f38feec23bf474e5e2f33984f465daef8d3b1e85d71a0d14ba0
-
SSDEEP
6144:mwYp93UiKXkpvcEkFJ79gMXWuRGw+6tXGM/zJ1HthtYrXCPl:qUQpvcEGx9gM3P+6tXNrJ1NSy9
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-