General
-
Target
JaffaCakes118_24ffe972e125f4d45c6c1a7966670fc2
-
Size
154KB
-
Sample
250226-lfwagsvlx8
-
MD5
24ffe972e125f4d45c6c1a7966670fc2
-
SHA1
abf668b75147f90277eb55b6b0ecf8208f74eb35
-
SHA256
87c2dfe97689dcc2fb5c0bcf9ef7e75860124d977697fb032e9eecdded16db45
-
SHA512
b1470d941bb3025653795fd1fca4c42bfc24a6acb880d90c6e1a2e76f733b57e513f02a0d7cc8bbb25bf195c5a6365367fe3c8c3421b90467632e315184939f9
-
SSDEEP
768:kp+MSM9ZRYMMDHjvEXDljfL/ffxGKDLXu:k8UXYMMHYDNfxGEDu
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_24ffe972e125f4d45c6c1a7966670fc2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_24ffe972e125f4d45c6c1a7966670fc2.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
JaffaCakes118_24ffe972e125f4d45c6c1a7966670fc2
-
Size
154KB
-
MD5
24ffe972e125f4d45c6c1a7966670fc2
-
SHA1
abf668b75147f90277eb55b6b0ecf8208f74eb35
-
SHA256
87c2dfe97689dcc2fb5c0bcf9ef7e75860124d977697fb032e9eecdded16db45
-
SHA512
b1470d941bb3025653795fd1fca4c42bfc24a6acb880d90c6e1a2e76f733b57e513f02a0d7cc8bbb25bf195c5a6365367fe3c8c3421b90467632e315184939f9
-
SSDEEP
768:kp+MSM9ZRYMMDHjvEXDljfL/ffxGKDLXu:k8UXYMMHYDNfxGEDu
Score10/10-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-