General

  • Target

    f979afb2c592749f96620f785f5211b4_JaffaCakes118

  • Size

    659KB

  • Sample

    240419-esg53agc84

  • MD5

    f979afb2c592749f96620f785f5211b4

  • SHA1

    dae183609260ea82bd76c50438da3f9d3c896e20

  • SHA256

    6c0300bac4102d67fb41d51f8da1766f65730a032f3c3ed5506139cb5546b25f

  • SHA512

    dcc4035ef1f64bca439627b4f98ef33b4f8e384b6260535fe78e9c4136231b53da53a25d76f29affd2efbe3726242a7b686d5f56c0b6af23d4c28cfcc179fad6

  • SSDEEP

    12288:kxpz4TolPke11PbUcqcyylNoJSKT4Cw5ZqDrqKgA96MmAgj218SLFBfc:kxF40pkW1j5LyylNoJSpCi4p96Mu6bBk

Score
7/10

Malware Config

Targets

    • Target

      f979afb2c592749f96620f785f5211b4_JaffaCakes118

    • Size

      659KB

    • MD5

      f979afb2c592749f96620f785f5211b4

    • SHA1

      dae183609260ea82bd76c50438da3f9d3c896e20

    • SHA256

      6c0300bac4102d67fb41d51f8da1766f65730a032f3c3ed5506139cb5546b25f

    • SHA512

      dcc4035ef1f64bca439627b4f98ef33b4f8e384b6260535fe78e9c4136231b53da53a25d76f29affd2efbe3726242a7b686d5f56c0b6af23d4c28cfcc179fad6

    • SSDEEP

      12288:kxpz4TolPke11PbUcqcyylNoJSKT4Cw5ZqDrqKgA96MmAgj218SLFBfc:kxF40pkW1j5LyylNoJSpCi4p96Mu6bBk

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks