General
-
Target
5293caf8da5a2ec1c309b2350b8c3dd9_JaffaCakes118
-
Size
3.5MB
-
Sample
240518-cfne7sfb7x
-
MD5
5293caf8da5a2ec1c309b2350b8c3dd9
-
SHA1
29468c93893106897c24bd141eb6ab418114c3b9
-
SHA256
a1dec2c5f22022b4978a4a77dff567d90f34ad47d9ebddb93ed67a833cdceb72
-
SHA512
d25412c34d6f47b6bdafe31dcc8cac6f2822a122098010e34e05757cab39c7bc33665f4f87d0254e85acaea7af82eda8731308c5c270e35072a20ba2e0e32e8b
-
SSDEEP
49152:iootQwPR5/uU6SkrjFdr9cLS3nMI/05zOKE1antX00I2qTtMi5PKJxxpfKuNsIu7:PkQS2U6zjTxP/05zvntX0L9Oau3b2EM
Static task
static1
Behavioral task
behavioral1
Sample
5293caf8da5a2ec1c309b2350b8c3dd9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5293caf8da5a2ec1c309b2350b8c3dd9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
5293caf8da5a2ec1c309b2350b8c3dd9_JaffaCakes118
-
Size
3.5MB
-
MD5
5293caf8da5a2ec1c309b2350b8c3dd9
-
SHA1
29468c93893106897c24bd141eb6ab418114c3b9
-
SHA256
a1dec2c5f22022b4978a4a77dff567d90f34ad47d9ebddb93ed67a833cdceb72
-
SHA512
d25412c34d6f47b6bdafe31dcc8cac6f2822a122098010e34e05757cab39c7bc33665f4f87d0254e85acaea7af82eda8731308c5c270e35072a20ba2e0e32e8b
-
SSDEEP
49152:iootQwPR5/uU6SkrjFdr9cLS3nMI/05zOKE1antX00I2qTtMi5PKJxxpfKuNsIu7:PkQS2U6zjTxP/05zvntX0L9Oau3b2EM
Score10/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-