General
-
Target
JaffaCakes118_7e79e08a581df76bc2a7abaf03123b8c
-
Size
162KB
-
Sample
250317-sylbkawqz9
-
MD5
7e79e08a581df76bc2a7abaf03123b8c
-
SHA1
80580437bc9a07c5f816b690c4d7430ad2d96f98
-
SHA256
48278fd9a563354b417e9b21241b59907470dfa98478409d50dd59111cbd72d4
-
SHA512
4eb4b8dd2adf558c3c1768cbcbd96921a62911f2a0c0b3959d017c117c5ce11c075fe067893f03c4539b5675729943037eb13b3005135696e7130fde459e9c98
-
SSDEEP
3072:WnJRlMMGYJ+ipesjoccP9r5l2z3ScxI10HZKYHOQBYWiuhdPn9I:WJhjqPpOWcxI10Hiuhd/C
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7e79e08a581df76bc2a7abaf03123b8c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7e79e08a581df76bc2a7abaf03123b8c.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
JaffaCakes118_7e79e08a581df76bc2a7abaf03123b8c
-
Size
162KB
-
MD5
7e79e08a581df76bc2a7abaf03123b8c
-
SHA1
80580437bc9a07c5f816b690c4d7430ad2d96f98
-
SHA256
48278fd9a563354b417e9b21241b59907470dfa98478409d50dd59111cbd72d4
-
SHA512
4eb4b8dd2adf558c3c1768cbcbd96921a62911f2a0c0b3959d017c117c5ce11c075fe067893f03c4539b5675729943037eb13b3005135696e7130fde459e9c98
-
SSDEEP
3072:WnJRlMMGYJ+ipesjoccP9r5l2z3ScxI10HZKYHOQBYWiuhdPn9I:WJhjqPpOWcxI10Hiuhd/C
Score10/10-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-