General
-
Target
3df7bc4330cbc1c3a20216780a632eb2_JaffaCakes118
-
Size
50KB
-
Sample
241013-fsj54avdjr
-
MD5
3df7bc4330cbc1c3a20216780a632eb2
-
SHA1
c17417cfa4cc64c394781f8d245f340273e9e61a
-
SHA256
f0150288594af47b481b7b6fc2b663f18c9b21f6a3c93f0d5f0ee45214e82349
-
SHA512
31fcbe4cea493ffe01cd7aaf6d0f900ef677ae442fc7977a84594cc9b6cadce27e5c3087cdc4dc1acaa7b8f16066aad2bdea8ea3311301e2c55e52d05e221c89
-
SSDEEP
1536:HgczqIfhbp1pG7oxrTt4ZWrGxjbD5rxR1sK8JnHqnXDWPN:vxnt4Z33DxEnH+0
Static task
static1
Behavioral task
behavioral1
Sample
3df7bc4330cbc1c3a20216780a632eb2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3df7bc4330cbc1c3a20216780a632eb2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
3df7bc4330cbc1c3a20216780a632eb2_JaffaCakes118
-
Size
50KB
-
MD5
3df7bc4330cbc1c3a20216780a632eb2
-
SHA1
c17417cfa4cc64c394781f8d245f340273e9e61a
-
SHA256
f0150288594af47b481b7b6fc2b663f18c9b21f6a3c93f0d5f0ee45214e82349
-
SHA512
31fcbe4cea493ffe01cd7aaf6d0f900ef677ae442fc7977a84594cc9b6cadce27e5c3087cdc4dc1acaa7b8f16066aad2bdea8ea3311301e2c55e52d05e221c89
-
SSDEEP
1536:HgczqIfhbp1pG7oxrTt4ZWrGxjbD5rxR1sK8JnHqnXDWPN:vxnt4Z33DxEnH+0
Score10/10-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-