General
-
Target
a2eac9b2c83157841fc8b83ecf4413a3_JaffaCakes118
-
Size
494KB
-
Sample
241126-tqp58avnck
-
MD5
a2eac9b2c83157841fc8b83ecf4413a3
-
SHA1
a100de68c4e63542d33c810d9353c36784e1802e
-
SHA256
63190576295e85d53cfc493f30583f1153796d6377191535c2ab9fc3f526aadf
-
SHA512
d12b42490fdddd0b258cc4c2cf9175e15e1766a4eaa300169c7519694df00a8bab60a53ae9adf2184523e37fd5f4eb3e384f4380640109f9a9543e85d154e465
-
SSDEEP
12288:o6Wq4aaE6KwyF5L0Y2D1PqLjJ/NUmDAFC/gP01MzKoKq5/Bb:+thEVaPqL9/NvDAFhEMuoKq5/Bb
Behavioral task
behavioral1
Sample
a2eac9b2c83157841fc8b83ecf4413a3_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
a2eac9b2c83157841fc8b83ecf4413a3_JaffaCakes118
-
Size
494KB
-
MD5
a2eac9b2c83157841fc8b83ecf4413a3
-
SHA1
a100de68c4e63542d33c810d9353c36784e1802e
-
SHA256
63190576295e85d53cfc493f30583f1153796d6377191535c2ab9fc3f526aadf
-
SHA512
d12b42490fdddd0b258cc4c2cf9175e15e1766a4eaa300169c7519694df00a8bab60a53ae9adf2184523e37fd5f4eb3e384f4380640109f9a9543e85d154e465
-
SSDEEP
12288:o6Wq4aaE6KwyF5L0Y2D1PqLjJ/NUmDAFC/gP01MzKoKq5/Bb:+thEVaPqL9/NvDAFhEMuoKq5/Bb
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-