General
-
Target
f629ee640abd8be3ede2f57f4fe66057_JaffaCakes118
-
Size
974KB
-
Sample
240417-tmh8hafa39
-
MD5
f629ee640abd8be3ede2f57f4fe66057
-
SHA1
c2d8da03720a801b504fb8e9bdcb986f3cd3b208
-
SHA256
56f3d0151d769256a91ee85e19a36f0fb040adfd527323f8ce30ed571880bd82
-
SHA512
ae91236c733f9f232748fa0d39537ab4bf35b0c9751bba1b5e9cb4d06f7cb2f6915e90fccd872817acfe9adc3054a3a19f0c7876849393badbb5f3d0f827da13
-
SSDEEP
24576:m5I61QFeQgi9LkfVnAl3SXghdfwtcvfsl+jgmKkCCgFFOf:m596Zgi9LkfVnAEXghdfbfsl+zC
Static task
static1
Behavioral task
behavioral1
Sample
f629ee640abd8be3ede2f57f4fe66057_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f629ee640abd8be3ede2f57f4fe66057_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
f629ee640abd8be3ede2f57f4fe66057_JaffaCakes118
-
Size
974KB
-
MD5
f629ee640abd8be3ede2f57f4fe66057
-
SHA1
c2d8da03720a801b504fb8e9bdcb986f3cd3b208
-
SHA256
56f3d0151d769256a91ee85e19a36f0fb040adfd527323f8ce30ed571880bd82
-
SHA512
ae91236c733f9f232748fa0d39537ab4bf35b0c9751bba1b5e9cb4d06f7cb2f6915e90fccd872817acfe9adc3054a3a19f0c7876849393badbb5f3d0f827da13
-
SSDEEP
24576:m5I61QFeQgi9LkfVnAl3SXghdfwtcvfsl+jgmKkCCgFFOf:m596Zgi9LkfVnAEXghdfbfsl+zC
Score10/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-