General
-
Target
2f6a1a6804e0152183975d771745ecf2_JaffaCakes118
-
Size
588KB
-
Sample
240510-q3xt2scf75
-
MD5
2f6a1a6804e0152183975d771745ecf2
-
SHA1
645dcbd2238cad8957f11a895e516990f89abf0a
-
SHA256
6c05ab7870d608d7510ef3850a9f58c70fd8ca63ff76358e7bb9e559b4f91b90
-
SHA512
40416c9cd45733c3d62ab0a4e259c6283916d2fbdb66ae39c9fe7f3386c12c79138c5de636941807d3d4357ee3af3af764161dfa9246d0c151423ede25c3944d
-
SSDEEP
12288:mXznQ+bCxWrUhLZvzC/igEhrNA9SNwyrYAmyhIna3PiGpYh7j:XgIh0/iLhrekeKYAl4RN
Static task
static1
Behavioral task
behavioral1
Sample
2f6a1a6804e0152183975d771745ecf2_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2f6a1a6804e0152183975d771745ecf2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2f6a1a6804e0152183975d771745ecf2_JaffaCakes118
-
Size
588KB
-
MD5
2f6a1a6804e0152183975d771745ecf2
-
SHA1
645dcbd2238cad8957f11a895e516990f89abf0a
-
SHA256
6c05ab7870d608d7510ef3850a9f58c70fd8ca63ff76358e7bb9e559b4f91b90
-
SHA512
40416c9cd45733c3d62ab0a4e259c6283916d2fbdb66ae39c9fe7f3386c12c79138c5de636941807d3d4357ee3af3af764161dfa9246d0c151423ede25c3944d
-
SSDEEP
12288:mXznQ+bCxWrUhLZvzC/igEhrNA9SNwyrYAmyhIna3PiGpYh7j:XgIh0/iLhrekeKYAl4RN
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-