General
-
Target
56087c3b2cfbffe4b6f785baec0f006f_JaffaCakes118
-
Size
98KB
-
Sample
240518-we39tafe8t
-
MD5
56087c3b2cfbffe4b6f785baec0f006f
-
SHA1
b4762a5fd443ccca31d78c0cf045aa3999e85a82
-
SHA256
a9dad966a82b5da0b31064ff0a5584331608998c278fc8466e140a0993ff52e9
-
SHA512
7abf4ad947d828e0c053421175af61cf10879aa7e8801240b89278f1e75a239e711a46254e2504db5941dad0319593ea8c77abeb75410d6045ee79aa9df4c382
-
SSDEEP
1536:cTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmbOcVf2nxqG0/7vdnA:cTs3BxJNmJIxqdLdT/ZzmKZxqdLdA
Static task
static1
Behavioral task
behavioral1
Sample
56087c3b2cfbffe4b6f785baec0f006f_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
56087c3b2cfbffe4b6f785baec0f006f_JaffaCakes118
-
Size
98KB
-
MD5
56087c3b2cfbffe4b6f785baec0f006f
-
SHA1
b4762a5fd443ccca31d78c0cf045aa3999e85a82
-
SHA256
a9dad966a82b5da0b31064ff0a5584331608998c278fc8466e140a0993ff52e9
-
SHA512
7abf4ad947d828e0c053421175af61cf10879aa7e8801240b89278f1e75a239e711a46254e2504db5941dad0319593ea8c77abeb75410d6045ee79aa9df4c382
-
SSDEEP
1536:cTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmbOcVf2nxqG0/7vdnA:cTs3BxJNmJIxqdLdT/ZzmKZxqdLdA
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-