General
-
Target
99cd19cf718b850cc79d2bf761915ae0_JaffaCakes118
-
Size
1.1MB
-
Sample
240606-cty4vseg2x
-
MD5
99cd19cf718b850cc79d2bf761915ae0
-
SHA1
5794b3b6dc34092f274971afa78872079d4446f2
-
SHA256
8aeb5dbfdb721c4666c2fe927cfbcdebbdd1836f63bacacbe9e420408d2e5651
-
SHA512
6e62b29c4c73883f4b3a3c453eca9d0d79457f8e5a64a433c8d48094ca5306844bdc101c1a9ff36b2f7d39526356406dd548eca1827f9a91d2e60adaf24e9fcf
-
SSDEEP
12288:DkP9YgDp9RgVyuYqNAPxz2Y6KLvOnR/jdMaI/VqcXXoXRgYNth7WFD1LgJu2uQtE:DkvDp9aEvkpMasXXceQHSFD1LzXffB
Static task
static1
Behavioral task
behavioral1
Sample
99cd19cf718b850cc79d2bf761915ae0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
99cd19cf718b850cc79d2bf761915ae0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
99cd19cf718b850cc79d2bf761915ae0_JaffaCakes118
-
Size
1.1MB
-
MD5
99cd19cf718b850cc79d2bf761915ae0
-
SHA1
5794b3b6dc34092f274971afa78872079d4446f2
-
SHA256
8aeb5dbfdb721c4666c2fe927cfbcdebbdd1836f63bacacbe9e420408d2e5651
-
SHA512
6e62b29c4c73883f4b3a3c453eca9d0d79457f8e5a64a433c8d48094ca5306844bdc101c1a9ff36b2f7d39526356406dd548eca1827f9a91d2e60adaf24e9fcf
-
SSDEEP
12288:DkP9YgDp9RgVyuYqNAPxz2Y6KLvOnR/jdMaI/VqcXXoXRgYNth7WFD1LgJu2uQtE:DkvDp9aEvkpMasXXceQHSFD1LzXffB
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-