General

  • Target

    484898d26726d45368503fbefa9ce90a_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240515-16qv1sfa78

  • MD5

    484898d26726d45368503fbefa9ce90a

  • SHA1

    bd6b09fc5568fb8fcb35aff0e2642f25f353aedb

  • SHA256

    392fc3fe7ba133fac5dbb43dcaa2d36b62f1111c9d573178d5f3138c7683a4e2

  • SHA512

    683e2c14851e40a6a5de56be2916b37009441932f5f9f4b1a6316df8a2c876f446b6afbd95808d2774808757dc84f7bfec3bf3c6233724ace8535d0b41318876

  • SSDEEP

    24576:7ophjgKvHM2Xl2DNtewU5GcK+vcG1vB7Dm/LOElL:Mphjhs2qNteVMcK+vB1vFDRER

Score
7/10

Malware Config

Targets

    • Target

      484898d26726d45368503fbefa9ce90a_JaffaCakes118

    • Size

      1.1MB

    • MD5

      484898d26726d45368503fbefa9ce90a

    • SHA1

      bd6b09fc5568fb8fcb35aff0e2642f25f353aedb

    • SHA256

      392fc3fe7ba133fac5dbb43dcaa2d36b62f1111c9d573178d5f3138c7683a4e2

    • SHA512

      683e2c14851e40a6a5de56be2916b37009441932f5f9f4b1a6316df8a2c876f446b6afbd95808d2774808757dc84f7bfec3bf3c6233724ace8535d0b41318876

    • SSDEEP

      24576:7ophjgKvHM2Xl2DNtewU5GcK+vcG1vB7Dm/LOElL:Mphjhs2qNteVMcK+vB1vFDRER

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks