General
-
Target
48b6c59d096668d7b97ff9e3b71048e4_JaffaCakes118
-
Size
102KB
-
Sample
240516-alyf9abg67
-
MD5
48b6c59d096668d7b97ff9e3b71048e4
-
SHA1
6a5f5a2cf3c36888074852c125de4092e1fc606e
-
SHA256
9d2ad3b35df27b512ad25ec8ff64621e0fb9897add7b0292f617d03c417c3522
-
SHA512
30ce249a4ec0af9783430cd424473f9182945fc8a7856d22bc22a0427787ba3b0e3c44d9df7cd728b1688e5b21b417ac5abfc6e2e4005f03a465daa9d3b55655
-
SSDEEP
1536:ALXB65939tY6HBg4sXJl4jA4MtOLnVy4EOcVf2PVgUfT:ALk395hYXJcaGn1NVX
Static task
static1
Behavioral task
behavioral1
Sample
48b6c59d096668d7b97ff9e3b71048e4_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
48b6c59d096668d7b97ff9e3b71048e4_JaffaCakes118
-
Size
102KB
-
MD5
48b6c59d096668d7b97ff9e3b71048e4
-
SHA1
6a5f5a2cf3c36888074852c125de4092e1fc606e
-
SHA256
9d2ad3b35df27b512ad25ec8ff64621e0fb9897add7b0292f617d03c417c3522
-
SHA512
30ce249a4ec0af9783430cd424473f9182945fc8a7856d22bc22a0427787ba3b0e3c44d9df7cd728b1688e5b21b417ac5abfc6e2e4005f03a465daa9d3b55655
-
SSDEEP
1536:ALXB65939tY6HBg4sXJl4jA4MtOLnVy4EOcVf2PVgUfT:ALk395hYXJcaGn1NVX
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-