General
-
Target
ec21170142adede052901ee0cc56bf19_JaffaCakes118
-
Size
420KB
-
Sample
240410-2eejcagc6w
-
MD5
ec21170142adede052901ee0cc56bf19
-
SHA1
7a23b36e9143709c21b029001ed57d075c165678
-
SHA256
b708a805c722b7381578b6bafc83aba1cbf1ff8f499c210cdb4d92159e47ebc2
-
SHA512
fbcf497bf6f3266c698a7e2e00662ba8913ffd1cb99286a853060bfc7166e444af3af482a178a7a4e3b51dcf6248c20d911373d3823e579d407d9e1914e7b66c
-
SSDEEP
12288:KqE6Zlh/f/2xqQeoTI4XfpVqTbVgem6S7:KqEihux1hhV8by9
Static task
static1
Behavioral task
behavioral1
Sample
ec21170142adede052901ee0cc56bf19_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec21170142adede052901ee0cc56bf19_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
ec21170142adede052901ee0cc56bf19_JaffaCakes118
-
Size
420KB
-
MD5
ec21170142adede052901ee0cc56bf19
-
SHA1
7a23b36e9143709c21b029001ed57d075c165678
-
SHA256
b708a805c722b7381578b6bafc83aba1cbf1ff8f499c210cdb4d92159e47ebc2
-
SHA512
fbcf497bf6f3266c698a7e2e00662ba8913ffd1cb99286a853060bfc7166e444af3af482a178a7a4e3b51dcf6248c20d911373d3823e579d407d9e1914e7b66c
-
SSDEEP
12288:KqE6Zlh/f/2xqQeoTI4XfpVqTbVgem6S7:KqEihux1hhV8by9
Score10/10-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-