General
-
Target
133058c98d2a52a8b72fced973662366_JaffaCakes118
-
Size
98KB
-
Sample
240504-r6d2sabg68
-
MD5
133058c98d2a52a8b72fced973662366
-
SHA1
aa9f6e344e4dd1722adeb9adfa5943022afae627
-
SHA256
2f63ea2f8d55438bed7b987aa258104ab53303c4dbaeae0dd04e01b4a9e326b5
-
SHA512
69f42279164c1f836cc279f364acfa5f329e8c718435b4fc17ff2e941e163e0dde920ff7f00e88dbf8dc09c250385d414d639c8664582bf0bd6fb2de0b98e085
-
SSDEEP
1536:cTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmbOcVf2nxqG0/7vdV8:cTs3BxJNmJIxqdLdT/ZzmKZxqdLdC
Static task
static1
Behavioral task
behavioral1
Sample
133058c98d2a52a8b72fced973662366_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
133058c98d2a52a8b72fced973662366_JaffaCakes118
-
Size
98KB
-
MD5
133058c98d2a52a8b72fced973662366
-
SHA1
aa9f6e344e4dd1722adeb9adfa5943022afae627
-
SHA256
2f63ea2f8d55438bed7b987aa258104ab53303c4dbaeae0dd04e01b4a9e326b5
-
SHA512
69f42279164c1f836cc279f364acfa5f329e8c718435b4fc17ff2e941e163e0dde920ff7f00e88dbf8dc09c250385d414d639c8664582bf0bd6fb2de0b98e085
-
SSDEEP
1536:cTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmbOcVf2nxqG0/7vdV8:cTs3BxJNmJIxqdLdT/ZzmKZxqdLdC
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-