General
-
Target
ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118
-
Size
440KB
-
Sample
240421-n3471sba8v
-
MD5
ff38fb89c4a9826d259d62c659caf13a
-
SHA1
476261ad1e841e211f6ae7d5b32eb961a8ebb701
-
SHA256
dc712109e28e6135df55071d9b83127fdf6b946c0ec99d48cfcf723c9ba9ebcd
-
SHA512
7e35455014c212fed72bbcf28f0a8f208361300d4a213aab4f05f226c6117c2be8fab10ef0e05b20894148b5e9ba7040668b17af73ac9e166d8a6d1f4f49eb38
-
SSDEEP
6144:K9qROWGtGSJLg/Ud0QjyIb7V6onNXmHIBGIwkmBbGzqSdlVVngwYcV9U:DROzk0Md1Y2oNwkmozqSdDVngx
Static task
static1
Behavioral task
behavioral1
Sample
ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118
-
Size
440KB
-
MD5
ff38fb89c4a9826d259d62c659caf13a
-
SHA1
476261ad1e841e211f6ae7d5b32eb961a8ebb701
-
SHA256
dc712109e28e6135df55071d9b83127fdf6b946c0ec99d48cfcf723c9ba9ebcd
-
SHA512
7e35455014c212fed72bbcf28f0a8f208361300d4a213aab4f05f226c6117c2be8fab10ef0e05b20894148b5e9ba7040668b17af73ac9e166d8a6d1f4f49eb38
-
SSDEEP
6144:K9qROWGtGSJLg/Ud0QjyIb7V6onNXmHIBGIwkmBbGzqSdlVVngwYcV9U:DROzk0Md1Y2oNwkmozqSdDVngx
Score10/10-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-