General
-
Target
76195dea24952425594e7db7239ce0aa_JaffaCakes118
-
Size
2.5MB
-
Sample
240526-t2cdhade63
-
MD5
76195dea24952425594e7db7239ce0aa
-
SHA1
b9791aef3c83751b937f2b60fda094cecb8954a8
-
SHA256
80e35297452f56d53068cfaa87d95cbb9af7f5a44c9db7b0a84f4a8ff83ebdaa
-
SHA512
0cdce90ccffcd69dcf5cc1ff8f0ecfc55f16227b2f6e1141f80c5dfe4dddec71db097755d47715cc59ea4f10ef5c72598eef252f87e923adbac212a27bd90727
-
SSDEEP
49152:WNx808T9CKJc5FwOTL6Xz0KlMJ+6NLptQx2UbdMM5Y2LWz:W4d9HxQuXzzMJ+65L12Lc
Behavioral task
behavioral1
Sample
76195dea24952425594e7db7239ce0aa_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
buer
http://burload01.top/
http://burload02.top/
Targets
-
-
Target
76195dea24952425594e7db7239ce0aa_JaffaCakes118
-
Size
2.5MB
-
MD5
76195dea24952425594e7db7239ce0aa
-
SHA1
b9791aef3c83751b937f2b60fda094cecb8954a8
-
SHA256
80e35297452f56d53068cfaa87d95cbb9af7f5a44c9db7b0a84f4a8ff83ebdaa
-
SHA512
0cdce90ccffcd69dcf5cc1ff8f0ecfc55f16227b2f6e1141f80c5dfe4dddec71db097755d47715cc59ea4f10ef5c72598eef252f87e923adbac212a27bd90727
-
SSDEEP
49152:WNx808T9CKJc5FwOTL6Xz0KlMJ+6NLptQx2UbdMM5Y2LWz:W4d9HxQuXzzMJ+65L12Lc
-
Modifies WinLogon for persistence
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-