General
-
Target
JaffaCakes118_64259b590d940c31567369dc4038efad
-
Size
148KB
-
Sample
250311-jzv3qaxj14
-
MD5
64259b590d940c31567369dc4038efad
-
SHA1
13f0e3b910559ffa9c7d246b9c4b5af439132ddc
-
SHA256
ea71c4637ebc8f144f2e41570d233b65f8549ec7c36fd9b49b1c816057a71745
-
SHA512
df8cf5e60ae53f9b46bfee1fc8b448935cac690717dfd9aa3cdbf8d4f9d09e584d8f0bd6deba4283b2bedc3b26125006f88554fbf603029d63e77d254e93356e
-
SSDEEP
3072:rXU8ENlgB7VWLhs8ss8SzUj+aajCKoCdCRhUzML14IO:rbUOZj+aajboYzMaB
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_64259b590d940c31567369dc4038efad.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_64259b590d940c31567369dc4038efad.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
JaffaCakes118_64259b590d940c31567369dc4038efad
-
Size
148KB
-
MD5
64259b590d940c31567369dc4038efad
-
SHA1
13f0e3b910559ffa9c7d246b9c4b5af439132ddc
-
SHA256
ea71c4637ebc8f144f2e41570d233b65f8549ec7c36fd9b49b1c816057a71745
-
SHA512
df8cf5e60ae53f9b46bfee1fc8b448935cac690717dfd9aa3cdbf8d4f9d09e584d8f0bd6deba4283b2bedc3b26125006f88554fbf603029d63e77d254e93356e
-
SSDEEP
3072:rXU8ENlgB7VWLhs8ss8SzUj+aajCKoCdCRhUzML14IO:rbUOZj+aajboYzMaB
Score10/10-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-