General
-
Target
JaffaCakes118_1507596fa6526bb29b7add253a4422cf
-
Size
365KB
-
Sample
250106-hsh9xasjdq
-
MD5
1507596fa6526bb29b7add253a4422cf
-
SHA1
31c75cf7479e8410ce7234a1064abd04b8010809
-
SHA256
3a9c46eccca422e6a7c8b7bebda9a7314c280742a53b63961f181530c56c233c
-
SHA512
f691bc462de60228aa00ea39aa3217783f8d656383ae9271d7a937f509fdfaab14436b934e054d46166278364ca7c6b6856338f6f3a42e1d24daa4b059c58cd1
-
SSDEEP
6144:beQ8CfYK6Uqd2GhNPwT2NE6UVKbM0I28VHbWpXqX1vST01:beQjY3Ui2iNYTQE6UYbMRZbv0y
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1507596fa6526bb29b7add253a4422cf.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
194.5.97.229:1195
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
JaffaCakes118_1507596fa6526bb29b7add253a4422cf
-
Size
365KB
-
MD5
1507596fa6526bb29b7add253a4422cf
-
SHA1
31c75cf7479e8410ce7234a1064abd04b8010809
-
SHA256
3a9c46eccca422e6a7c8b7bebda9a7314c280742a53b63961f181530c56c233c
-
SHA512
f691bc462de60228aa00ea39aa3217783f8d656383ae9271d7a937f509fdfaab14436b934e054d46166278364ca7c6b6856338f6f3a42e1d24daa4b059c58cd1
-
SSDEEP
6144:beQ8CfYK6Uqd2GhNPwT2NE6UVKbM0I28VHbWpXqX1vST01:beQjY3Ui2iNYTQE6UYbMRZbv0y
-
Asyncrat family
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1