General
-
Target
43d639a0906d7ffc411e546f20cc8340_JaffaCakes118
-
Size
885KB
-
Sample
240515-a5nfdsgg5z
-
MD5
43d639a0906d7ffc411e546f20cc8340
-
SHA1
fb2035371453531924da481ad2d096e2aff10905
-
SHA256
7741ec045781e5b7cb1c6a6b46788f7940b3539595334a939afbeb6e61919de8
-
SHA512
7998e69e7cf455f8fc26a71a30bc2a987f9398583c6ac7a40bee8a6db49922885d2b9d72513592532489657889c84e8bedea8ac67b3cc551ec59d3af57fe7809
-
SSDEEP
24576:huvYVsT1lnTPopmmyBgCl3T0lVz6odQ6R:0vYkRTE3YcbQO
Static task
static1
Behavioral task
behavioral1
Sample
43d639a0906d7ffc411e546f20cc8340_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
43d639a0906d7ffc411e546f20cc8340_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
43d639a0906d7ffc411e546f20cc8340_JaffaCakes118
-
Size
885KB
-
MD5
43d639a0906d7ffc411e546f20cc8340
-
SHA1
fb2035371453531924da481ad2d096e2aff10905
-
SHA256
7741ec045781e5b7cb1c6a6b46788f7940b3539595334a939afbeb6e61919de8
-
SHA512
7998e69e7cf455f8fc26a71a30bc2a987f9398583c6ac7a40bee8a6db49922885d2b9d72513592532489657889c84e8bedea8ac67b3cc551ec59d3af57fe7809
-
SSDEEP
24576:huvYVsT1lnTPopmmyBgCl3T0lVz6odQ6R:0vYkRTE3YcbQO
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-