Analysis
-
max time kernel
144s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
f8a6f7ebc0a50b7fb894b841c7f86736_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8a6f7ebc0a50b7fb894b841c7f86736_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8a6f7ebc0a50b7fb894b841c7f86736_JaffaCakes118.exe
-
Size
3.2MB
-
MD5
f8a6f7ebc0a50b7fb894b841c7f86736
-
SHA1
3388a58a896cef953dc94e72308198403b021175
-
SHA256
72b6e2db1cf1cf739514147d8e3387246d5bb60f342e34865fa836929a2b3b99
-
SHA512
8b0a1d001d0b7661bb67d620c6067750739414eaeeca36535fa1102bf95b77fbc9fecf057d50af43fe62ffc0f92ad6bfa56cf25fbd3a931ff71e60b9bc0b031b
-
SSDEEP
49152:mm/lFop9lF4y/DLRBKFv8B47MfSH2X1b/ZXQ76yAZb6o/zNAd2U04jWeI:z0ZnRB5BQ2XpZXFyAZr/82U08W
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f8a6f7ebc0a50b7fb894b841c7f86736_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f8a6f7ebc0a50b7fb894b841c7f86736_JaffaCakes118.exe