General
-
Target
15eef604313e0e3e9d79b14d0e662b62_JaffaCakes118
-
Size
235KB
-
Sample
241005-dpfbmawerf
-
MD5
15eef604313e0e3e9d79b14d0e662b62
-
SHA1
3a7e208bed22446c3cf351fa630a740bc8eaf63b
-
SHA256
349f93550a061292b1f930af7eb15301091da150bcaf34a781acf3c39febf8ac
-
SHA512
1e1d4cef324de6814489d1b26aba18a76787ab237ac9f5d9d29b1f398f577d3a7f6c9d768cbc84b6575551df318ce97c963ba39ffa9af5fe33c5641f1ce2d335
-
SSDEEP
6144:govFwM12NoLHwr/3Cl0lAmoamFdhyHJf:giFENoLE6lhmGXYJ
Static task
static1
Behavioral task
behavioral1
Sample
15eef604313e0e3e9d79b14d0e662b62_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15eef604313e0e3e9d79b14d0e662b62_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
15eef604313e0e3e9d79b14d0e662b62_JaffaCakes118
-
Size
235KB
-
MD5
15eef604313e0e3e9d79b14d0e662b62
-
SHA1
3a7e208bed22446c3cf351fa630a740bc8eaf63b
-
SHA256
349f93550a061292b1f930af7eb15301091da150bcaf34a781acf3c39febf8ac
-
SHA512
1e1d4cef324de6814489d1b26aba18a76787ab237ac9f5d9d29b1f398f577d3a7f6c9d768cbc84b6575551df318ce97c963ba39ffa9af5fe33c5641f1ce2d335
-
SSDEEP
6144:govFwM12NoLHwr/3Cl0lAmoamFdhyHJf:giFENoLE6lhmGXYJ
Score7/10-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Suspicious use of SetThreadContext
-