General
-
Target
3a3542745518e3b42f4d24429ed7f580_JaffaCakes118
-
Size
114KB
-
Sample
241012-qhlahswhjp
-
MD5
3a3542745518e3b42f4d24429ed7f580
-
SHA1
f819d7244c43adfe489cb8e5f9d547486e4dba9e
-
SHA256
2aa81aa02e8f0d56ef6c3c677ad72e412a79d94714b155df4f1fa995afcf5f24
-
SHA512
f1728a72d6ebec5379dbad3403595603b696367c452630c74252b93ead63ccf7d491f4c694db80e43f8d9aa6a14b20c0133236d008744e5d662920cf6a9aa8f2
-
SSDEEP
1536:yoW8rAbeom6UB3cLo5KdaCYndoQAgtjz5HWoVSdFbzWOcs+NI5DBT/0:mqomBcL6doSRz5Ki
Static task
static1
Behavioral task
behavioral1
Sample
3a3542745518e3b42f4d24429ed7f580_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a3542745518e3b42f4d24429ed7f580_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
3a3542745518e3b42f4d24429ed7f580_JaffaCakes118
-
Size
114KB
-
MD5
3a3542745518e3b42f4d24429ed7f580
-
SHA1
f819d7244c43adfe489cb8e5f9d547486e4dba9e
-
SHA256
2aa81aa02e8f0d56ef6c3c677ad72e412a79d94714b155df4f1fa995afcf5f24
-
SHA512
f1728a72d6ebec5379dbad3403595603b696367c452630c74252b93ead63ccf7d491f4c694db80e43f8d9aa6a14b20c0133236d008744e5d662920cf6a9aa8f2
-
SSDEEP
1536:yoW8rAbeom6UB3cLo5KdaCYndoQAgtjz5HWoVSdFbzWOcs+NI5DBT/0:mqomBcL6doSRz5Ki
Score10/10-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-