General

  • Target

    0fe12dbcf0816399ec3963010cabe898_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240328-zt2lbage3w

  • MD5

    0fe12dbcf0816399ec3963010cabe898

  • SHA1

    0c7786efb565321c5b8bffaa2650d421aef57bc6

  • SHA256

    9ef5ce9c80b5bb82639eec8799a47e08ba4c44bedcb871d2a005c933b12a14b9

  • SHA512

    9a19aa6fb4b5764f2c50e9350d093f648dda7e90ac665d918b44ce19a209bc1f4856bb6394b9f42178724896b427616e0fc4038d746a30999b0a46dbf7185a97

  • SSDEEP

    49152:Yrn7yit169qMJTUdCVSESCeKVzXIdlJRHq4mlNLtgOl3ZgehBEKVWzrj9g:Enm8MJgcmiVIlJRKlJCOoe3EKUj9g

Malware Config

Targets

    • Target

      0fe12dbcf0816399ec3963010cabe898_JaffaCakes118

    • Size

      2.2MB

    • MD5

      0fe12dbcf0816399ec3963010cabe898

    • SHA1

      0c7786efb565321c5b8bffaa2650d421aef57bc6

    • SHA256

      9ef5ce9c80b5bb82639eec8799a47e08ba4c44bedcb871d2a005c933b12a14b9

    • SHA512

      9a19aa6fb4b5764f2c50e9350d093f648dda7e90ac665d918b44ce19a209bc1f4856bb6394b9f42178724896b427616e0fc4038d746a30999b0a46dbf7185a97

    • SSDEEP

      49152:Yrn7yit169qMJTUdCVSESCeKVzXIdlJRHq4mlNLtgOl3ZgehBEKVWzrj9g:Enm8MJgcmiVIlJRKlJCOoe3EKUj9g

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks