General
-
Target
76431e61e2c699aa3dd4ed608c34b56c_JaffaCakes118
-
Size
2.0MB
-
Sample
240526-v5zhwaeb5s
-
MD5
76431e61e2c699aa3dd4ed608c34b56c
-
SHA1
d282c7fa4c12de3bcd338f5a57f50a98ce9e9b1f
-
SHA256
ef84d70a012ffe0f9d8b459c10c0c2744892dde7b2d8938c95f03fdcccad6347
-
SHA512
858f9017309b5233163780a51563b1cccb48affd3ee61cfaa7b22215b78e9c1ee7636f19df919bc94ede75648261f8c921b24ed9898bc358b2f696dae529b97f
-
SSDEEP
49152:sbJ0WAn1im7D9cSjMK6a4YSi8UFf9SfYFm4EnXUVf:+J0WAn1j9tv5TFf9SwFLEnXu
Static task
static1
Behavioral task
behavioral1
Sample
76431e61e2c699aa3dd4ed608c34b56c_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
76431e61e2c699aa3dd4ed608c34b56c_JaffaCakes118
-
Size
2.0MB
-
MD5
76431e61e2c699aa3dd4ed608c34b56c
-
SHA1
d282c7fa4c12de3bcd338f5a57f50a98ce9e9b1f
-
SHA256
ef84d70a012ffe0f9d8b459c10c0c2744892dde7b2d8938c95f03fdcccad6347
-
SHA512
858f9017309b5233163780a51563b1cccb48affd3ee61cfaa7b22215b78e9c1ee7636f19df919bc94ede75648261f8c921b24ed9898bc358b2f696dae529b97f
-
SSDEEP
49152:sbJ0WAn1im7D9cSjMK6a4YSi8UFf9SfYFm4EnXUVf:+J0WAn1j9tv5TFf9SwFLEnXu
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-