General
-
Target
630c21a445c205505221ce85753305a9_JaffaCakes118
-
Size
30KB
-
Sample
240521-m1kj6aah84
-
MD5
630c21a445c205505221ce85753305a9
-
SHA1
c5250b5f361025445791ba5d4d7a3e407eba2578
-
SHA256
0956bc121028e4e1883277680b745a1707b83e90485c392f3943c9259b51524c
-
SHA512
ecec55a8ccea0158a3b200d560cf22483336377e571faf6d6226dfa000f887df09108134a3509b6bb6e49b2565098620fd8e992ade5326c8d8991c60cd1d47be
-
SSDEEP
384:k3gCPh3YEPbyvnkYUROXpG6k4xHVNzvCvhECXeUJRX4NwWZxg5yJy53tWObWjBCg:ABtqmRwptVVUvvewUTJy5dxKZ
Static task
static1
Behavioral task
behavioral1
Sample
630c21a445c205505221ce85753305a9_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
630c21a445c205505221ce85753305a9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
630c21a445c205505221ce85753305a9_JaffaCakes118
-
Size
30KB
-
MD5
630c21a445c205505221ce85753305a9
-
SHA1
c5250b5f361025445791ba5d4d7a3e407eba2578
-
SHA256
0956bc121028e4e1883277680b745a1707b83e90485c392f3943c9259b51524c
-
SHA512
ecec55a8ccea0158a3b200d560cf22483336377e571faf6d6226dfa000f887df09108134a3509b6bb6e49b2565098620fd8e992ade5326c8d8991c60cd1d47be
-
SSDEEP
384:k3gCPh3YEPbyvnkYUROXpG6k4xHVNzvCvhECXeUJRX4NwWZxg5yJy53tWObWjBCg:ABtqmRwptVVUvvewUTJy5dxKZ
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-