General
-
Target
c2a7ca706cb6503207e61312c8f158d1_JaffaCakes118
-
Size
329KB
-
Sample
241204-qbmj1awmbv
-
MD5
c2a7ca706cb6503207e61312c8f158d1
-
SHA1
f926eb3c8907996211a444570f4b18ab9dc6630b
-
SHA256
e4792e7327b946c92f7ea4ef5bc8d553665cade526b0a8309cc891491595e3a1
-
SHA512
a24738cb641c78a87d5dc4a2cdae5372375f05e4a4aa4fae84d2ecdd9ead78693191a43e44969530be33c6f1ac20baa5ca3660d27a28d5ce771387c2494241cb
-
SSDEEP
6144:cDBSP9c0wEjnb1QP4A8bKkfjLd8wTmbppIxII+DGI0VTan:cNSPB1PDbKk7Lq4mbI+tn
Behavioral task
behavioral1
Sample
c2a7ca706cb6503207e61312c8f158d1_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c2a7ca706cb6503207e61312c8f158d1_JaffaCakes118
-
Size
329KB
-
MD5
c2a7ca706cb6503207e61312c8f158d1
-
SHA1
f926eb3c8907996211a444570f4b18ab9dc6630b
-
SHA256
e4792e7327b946c92f7ea4ef5bc8d553665cade526b0a8309cc891491595e3a1
-
SHA512
a24738cb641c78a87d5dc4a2cdae5372375f05e4a4aa4fae84d2ecdd9ead78693191a43e44969530be33c6f1ac20baa5ca3660d27a28d5ce771387c2494241cb
-
SSDEEP
6144:cDBSP9c0wEjnb1QP4A8bKkfjLd8wTmbppIxII+DGI0VTan:cNSPB1PDbKk7Lq4mbI+tn
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-