General
-
Target
a0e78cc1271b133b728838c438a9f25d_JaffaCakes118
-
Size
1.1MB
-
Sample
240612-q8mw2a1dkk
-
MD5
a0e78cc1271b133b728838c438a9f25d
-
SHA1
f86a4faa766d058c284f40288e9d8281d6291c0e
-
SHA256
d02987dd2ddd83ae9686ef87566d1976a7f728b14cf9242b64d7566c3a1385a7
-
SHA512
f64bf0aa367fb144ff866fec1d6bacfee7f3126682f27348d26f3d64c9631b83ad9b5b6c76b45edc96cf19438f4bb59f02f8e3fcef90fbe8a57343914bd893c4
-
SSDEEP
12288:+uklkMVqd1t8jEIoCTaPG0j4DeuH5GyAw64vYr1IZq6T7UNU7hm92J6Gz1VwFAHG:+3jl2WzbZL6gEAqEVmA7x6FAncr
Static task
static1
Behavioral task
behavioral1
Sample
a0e78cc1271b133b728838c438a9f25d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a0e78cc1271b133b728838c438a9f25d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
a0e78cc1271b133b728838c438a9f25d_JaffaCakes118
-
Size
1.1MB
-
MD5
a0e78cc1271b133b728838c438a9f25d
-
SHA1
f86a4faa766d058c284f40288e9d8281d6291c0e
-
SHA256
d02987dd2ddd83ae9686ef87566d1976a7f728b14cf9242b64d7566c3a1385a7
-
SHA512
f64bf0aa367fb144ff866fec1d6bacfee7f3126682f27348d26f3d64c9631b83ad9b5b6c76b45edc96cf19438f4bb59f02f8e3fcef90fbe8a57343914bd893c4
-
SSDEEP
12288:+uklkMVqd1t8jEIoCTaPG0j4DeuH5GyAw64vYr1IZq6T7UNU7hm92J6Gz1VwFAHG:+3jl2WzbZL6gEAqEVmA7x6FAncr
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-