General
-
Target
3cca89a4ea131049cb014bd902fbc046_JaffaCakes118
-
Size
317KB
-
Sample
241013-ak7njatdmk
-
MD5
3cca89a4ea131049cb014bd902fbc046
-
SHA1
26cd82b7e197cea2a54ea5fddc586838a7e48d97
-
SHA256
e8b0771b9473dd8fbb79a88026555a03ae9e95b2a9098cceb1f78e0ea1e49324
-
SHA512
ffebdcd16d69fcb47057c7682d0813e9c8a37d5e6fa10f70914666b7afce56570317074f9508b41179dd81c24b4f5a2453daff6cc0efd046b8d136cd713593b3
-
SSDEEP
6144:TDBSP9c0wEjnb1QP4A8bKkfjLd8wTmbppIxIInDMTaF2:TNSPB1PDbKk7Lq4mbInwTs2
Behavioral task
behavioral1
Sample
3cca89a4ea131049cb014bd902fbc046_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
3cca89a4ea131049cb014bd902fbc046_JaffaCakes118
-
Size
317KB
-
MD5
3cca89a4ea131049cb014bd902fbc046
-
SHA1
26cd82b7e197cea2a54ea5fddc586838a7e48d97
-
SHA256
e8b0771b9473dd8fbb79a88026555a03ae9e95b2a9098cceb1f78e0ea1e49324
-
SHA512
ffebdcd16d69fcb47057c7682d0813e9c8a37d5e6fa10f70914666b7afce56570317074f9508b41179dd81c24b4f5a2453daff6cc0efd046b8d136cd713593b3
-
SSDEEP
6144:TDBSP9c0wEjnb1QP4A8bKkfjLd8wTmbppIxIInDMTaF2:TNSPB1PDbKk7Lq4mbInwTs2
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-