General
-
Target
615073eb75ad0dbccb6afaf663ffd0e4_JaffaCakes118
-
Size
77KB
-
Sample
241020-kjb6ca1bpp
-
MD5
615073eb75ad0dbccb6afaf663ffd0e4
-
SHA1
4cdb636ba2c1c3dba0368ce31667578160db9adb
-
SHA256
bca1659fd2cde4e10be7dc027f3327f4c1b9cb97e90cbccb0d17fc82e2327a35
-
SHA512
3a14d6b5abeeded7229888b6e45aa46b2ff657c419b42de97ddf69a9587e855fb3758d5f76c59ebad0c95f62074a78a70c9ec6a3546a74dc1b5b89cf010bf635
-
SSDEEP
768:JtdO8/vaB3KOVSlxr4tC3/ps/DKE/Oxg8VbKp4wHiXtv3qPI1+AMDLVIJjFAMVrf://CpV0ACPps/PNubK5HKvai+rqHhCE
Static task
static1
Behavioral task
behavioral1
Sample
615073eb75ad0dbccb6afaf663ffd0e4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
615073eb75ad0dbccb6afaf663ffd0e4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
615073eb75ad0dbccb6afaf663ffd0e4_JaffaCakes118
-
Size
77KB
-
MD5
615073eb75ad0dbccb6afaf663ffd0e4
-
SHA1
4cdb636ba2c1c3dba0368ce31667578160db9adb
-
SHA256
bca1659fd2cde4e10be7dc027f3327f4c1b9cb97e90cbccb0d17fc82e2327a35
-
SHA512
3a14d6b5abeeded7229888b6e45aa46b2ff657c419b42de97ddf69a9587e855fb3758d5f76c59ebad0c95f62074a78a70c9ec6a3546a74dc1b5b89cf010bf635
-
SSDEEP
768:JtdO8/vaB3KOVSlxr4tC3/ps/DKE/Oxg8VbKp4wHiXtv3qPI1+AMDLVIJjFAMVrf://CpV0ACPps/PNubK5HKvai+rqHhCE
Score10/10-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-