General
-
Target
4479b37295b978bc81b1edf547ebddf5_JaffaCakes118
-
Size
1.4MB
-
Sample
240515-en8r8agd5z
-
MD5
4479b37295b978bc81b1edf547ebddf5
-
SHA1
d423944a9b7689c43d854b9ca084f6cc56ad2307
-
SHA256
8112636a60f6c618a55624cd8d6cdec6d6c70e834c7356ffaa6cc1742889228d
-
SHA512
589d1c28ccfe1cfeaa1eef5c11637232d4127b764189a37d9e1991686e362fa77a58c605581727bd1eb6a63ad82b99104df1f1c479823ffd183bde03043bdfdb
-
SSDEEP
24576:zub3zUtvDOFwUj+d/4UHLKNwa/SIA/rL4nyauwXtgUz/V+6JihK9P5/LvOYKe17l:zub3zUtvDMj0QUONwcAPQ15VJGkZ17XV
Static task
static1
Behavioral task
behavioral1
Sample
4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
4479b37295b978bc81b1edf547ebddf5_JaffaCakes118
-
Size
1.4MB
-
MD5
4479b37295b978bc81b1edf547ebddf5
-
SHA1
d423944a9b7689c43d854b9ca084f6cc56ad2307
-
SHA256
8112636a60f6c618a55624cd8d6cdec6d6c70e834c7356ffaa6cc1742889228d
-
SHA512
589d1c28ccfe1cfeaa1eef5c11637232d4127b764189a37d9e1991686e362fa77a58c605581727bd1eb6a63ad82b99104df1f1c479823ffd183bde03043bdfdb
-
SSDEEP
24576:zub3zUtvDOFwUj+d/4UHLKNwa/SIA/rL4nyauwXtgUz/V+6JihK9P5/LvOYKe17l:zub3zUtvDMj0QUONwcAPQ15VJGkZ17XV
Score10/10-
XMRig Miner payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-