General
-
Target
0ec23f1b51bff9fc5f27c449eec7fc37_JaffaCakes118
-
Size
1.5MB
-
Sample
240502-rt8evsah2s
-
MD5
0ec23f1b51bff9fc5f27c449eec7fc37
-
SHA1
4c7cbafae7b0a7dcb207f6641c7aba05e05e2b54
-
SHA256
72afb7a0b5943a2ee84148c80998284e805ee441df1d46afd000e4aae7699c00
-
SHA512
c5a9039e6966a2eb0da574809a4293217bf07121219fa385229dce15e8508f7a1327251c49795b0cff82caef700584531c7346cdd1087a367d03afe4a9edc72e
-
SSDEEP
24576:Df2mRwsviHnTK6yssdZYjs6TP3CPRZ6qm/0a/nz0wt5PkAE8xL:Df2mRwjzKXisCP6RkVlMABL
Static task
static1
Behavioral task
behavioral1
Sample
0ec23f1b51bff9fc5f27c449eec7fc37_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ec23f1b51bff9fc5f27c449eec7fc37_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
0ec23f1b51bff9fc5f27c449eec7fc37_JaffaCakes118
-
Size
1.5MB
-
MD5
0ec23f1b51bff9fc5f27c449eec7fc37
-
SHA1
4c7cbafae7b0a7dcb207f6641c7aba05e05e2b54
-
SHA256
72afb7a0b5943a2ee84148c80998284e805ee441df1d46afd000e4aae7699c00
-
SHA512
c5a9039e6966a2eb0da574809a4293217bf07121219fa385229dce15e8508f7a1327251c49795b0cff82caef700584531c7346cdd1087a367d03afe4a9edc72e
-
SSDEEP
24576:Df2mRwsviHnTK6yssdZYjs6TP3CPRZ6qm/0a/nz0wt5PkAE8xL:Df2mRwjzKXisCP6RkVlMABL
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-