General
-
Target
JaffaCakes118_8ba3b3f8739e4e83582e07d48e8f2896
-
Size
43KB
-
Sample
250117-pncpwsyjap
-
MD5
8ba3b3f8739e4e83582e07d48e8f2896
-
SHA1
52f6bad376fc623008a504f569516605e2f609cc
-
SHA256
73dc4645cf8fd21515927336b27a1414ed8bcf107777981ebe5d400d0f75ab2e
-
SHA512
0d9cb47a4a0120dadec2809c50c113c1baa79b5dc66d4ca908fde1fe2a1772a8f11d6c2977b553442fb067214ac11621b8cf433904749658922cdb4dc814608b
-
SSDEEP
768:bdGo443/5F6YV6JouyEJSOBPGswYuzIAebmFTZpcdg2qXOlHOGw:booj3hFDgJouyUgswd9ZOLqXOlI
Behavioral task
behavioral1
Sample
JaffaCakes118_8ba3b3f8739e4e83582e07d48e8f2896.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_8ba3b3f8739e4e83582e07d48e8f2896
-
Size
43KB
-
MD5
8ba3b3f8739e4e83582e07d48e8f2896
-
SHA1
52f6bad376fc623008a504f569516605e2f609cc
-
SHA256
73dc4645cf8fd21515927336b27a1414ed8bcf107777981ebe5d400d0f75ab2e
-
SHA512
0d9cb47a4a0120dadec2809c50c113c1baa79b5dc66d4ca908fde1fe2a1772a8f11d6c2977b553442fb067214ac11621b8cf433904749658922cdb4dc814608b
-
SSDEEP
768:bdGo443/5F6YV6JouyEJSOBPGswYuzIAebmFTZpcdg2qXOlHOGw:booj3hFDgJouyUgswd9ZOLqXOlI
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-