General
-
Target
b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118
-
Size
88KB
-
Sample
241130-fhq6natkft
-
MD5
b4dd126a8a85297f6695d1e89f8a827b
-
SHA1
888390b12724c4f7de484029b081cc5cd78d239d
-
SHA256
e055346bbcea8acc879fc9ab7cc231658971d42f463c1a4a139a139fbbb95ac7
-
SHA512
0c0c5899ff61b487469dad1a4348ef2ec7f8e04c6a21509c4165dd7f8864ead17360b9198c79c602123c5e3d31dfb7cc14bafa4245421be0c171aaf6d4791572
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEP:6D0ctAVA/bmxIMnoKjyR/NP
Static task
static1
Behavioral task
behavioral1
Sample
b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118
-
Size
88KB
-
MD5
b4dd126a8a85297f6695d1e89f8a827b
-
SHA1
888390b12724c4f7de484029b081cc5cd78d239d
-
SHA256
e055346bbcea8acc879fc9ab7cc231658971d42f463c1a4a139a139fbbb95ac7
-
SHA512
0c0c5899ff61b487469dad1a4348ef2ec7f8e04c6a21509c4165dd7f8864ead17360b9198c79c602123c5e3d31dfb7cc14bafa4245421be0c171aaf6d4791572
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEP:6D0ctAVA/bmxIMnoKjyR/NP
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-