General
-
Target
04ad3d325016a11314b612524f7f87aa_JaffaCakes118
-
Size
156KB
-
Sample
241001-g5x36avelk
-
MD5
04ad3d325016a11314b612524f7f87aa
-
SHA1
1d5a1bc1d9e3e3a0cbdc56e83ea8000c4d4e887d
-
SHA256
5565b8d0c27d836930658fed83b37cc47dd44edbcbf03de66a2b19974f6891e6
-
SHA512
0a30416a96bbea2e15b4206857a898bae5d1876fb27ba6ed51460d0c7054698e166d1583d95029a44eddb4d1f6aa73fe0ee7f745bc82c5b0d758190b6a123c50
-
SSDEEP
3072:dD440wdsKfsCM9vd0UkmLSA+ecsM9JcrNclFtZPsVqFJWe3KW+/KXo:dDp0uNM9PjLSQNr6lsVqF9+KX
Static task
static1
Behavioral task
behavioral1
Sample
04ad3d325016a11314b612524f7f87aa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
04ad3d325016a11314b612524f7f87aa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
04ad3d325016a11314b612524f7f87aa_JaffaCakes118
-
Size
156KB
-
MD5
04ad3d325016a11314b612524f7f87aa
-
SHA1
1d5a1bc1d9e3e3a0cbdc56e83ea8000c4d4e887d
-
SHA256
5565b8d0c27d836930658fed83b37cc47dd44edbcbf03de66a2b19974f6891e6
-
SHA512
0a30416a96bbea2e15b4206857a898bae5d1876fb27ba6ed51460d0c7054698e166d1583d95029a44eddb4d1f6aa73fe0ee7f745bc82c5b0d758190b6a123c50
-
SSDEEP
3072:dD440wdsKfsCM9vd0UkmLSA+ecsM9JcrNclFtZPsVqFJWe3KW+/KXo:dDp0uNM9PjLSQNr6lsVqF9+KX
Score7/10-
Deletes itself
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Suspicious use of SetThreadContext
-