General
-
Target
f1d10397907e42655eb39c0c8147dda5_JaffaCakes118
-
Size
323KB
-
Sample
240415-yttp2aeh75
-
MD5
f1d10397907e42655eb39c0c8147dda5
-
SHA1
49fe4db22ad49af9766aeb415f521dcd7803b8d9
-
SHA256
fbd1ef45260af43c798a768ccdc1a792f00a0b808605d161a7f072e3260294db
-
SHA512
65bc94ee71ebd7c87f2f20cfabd8c5618984372343af69e5615492cf8161781e1ebbf632c0a60a9111fdf2741a99442155ea1ca8168fe22720da6e893882561b
-
SSDEEP
6144:+va/giBihpLigYEwGUyLiyLguCRZbxMwXSmd95JcMn:+SYzOgYEwGUyLidumVRJ
Static task
static1
Behavioral task
behavioral1
Sample
f1d10397907e42655eb39c0c8147dda5_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
f1d10397907e42655eb39c0c8147dda5_JaffaCakes118
-
Size
323KB
-
MD5
f1d10397907e42655eb39c0c8147dda5
-
SHA1
49fe4db22ad49af9766aeb415f521dcd7803b8d9
-
SHA256
fbd1ef45260af43c798a768ccdc1a792f00a0b808605d161a7f072e3260294db
-
SHA512
65bc94ee71ebd7c87f2f20cfabd8c5618984372343af69e5615492cf8161781e1ebbf632c0a60a9111fdf2741a99442155ea1ca8168fe22720da6e893882561b
-
SSDEEP
6144:+va/giBihpLigYEwGUyLiyLguCRZbxMwXSmd95JcMn:+SYzOgYEwGUyLidumVRJ
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-