General
-
Target
a02b961480e8b7fc9313c6e2ae480442_JaffaCakes118
-
Size
252KB
-
Sample
241126-gjve5stqck
-
MD5
a02b961480e8b7fc9313c6e2ae480442
-
SHA1
fa6243f289015a1a78a5fd28f3eba56d07c33f6b
-
SHA256
be090c085eab0d51085dbb9f2db28a5f117351ebb980b372efc2ce2cf419b120
-
SHA512
c721a7eb719be9b57716f9ab739a65cf89bf88db2681964017a41c84fc734954b1d87b30881631f355f82c2dab1dff3d209d078e490960dc0e1691c6d1505792
-
SSDEEP
6144:b1Wj/JCXHjMc5qKeMuFFKN0jb2ZlhdBJVjY/eRUExoJyOYHB7qY8zIK0GznuAXyk:pWj
Static task
static1
Behavioral task
behavioral1
Sample
a02b961480e8b7fc9313c6e2ae480442_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a02b961480e8b7fc9313c6e2ae480442_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
a02b961480e8b7fc9313c6e2ae480442_JaffaCakes118
-
Size
252KB
-
MD5
a02b961480e8b7fc9313c6e2ae480442
-
SHA1
fa6243f289015a1a78a5fd28f3eba56d07c33f6b
-
SHA256
be090c085eab0d51085dbb9f2db28a5f117351ebb980b372efc2ce2cf419b120
-
SHA512
c721a7eb719be9b57716f9ab739a65cf89bf88db2681964017a41c84fc734954b1d87b30881631f355f82c2dab1dff3d209d078e490960dc0e1691c6d1505792
-
SSDEEP
6144:b1Wj/JCXHjMc5qKeMuFFKN0jb2ZlhdBJVjY/eRUExoJyOYHB7qY8zIK0GznuAXyk:pWj
Score10/10-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-