General
-
Target
b9dc7755917b72f0d10994ff3c3b0967_JaffaCakes118
-
Size
426KB
-
Sample
240617-y45kaasfpg
-
MD5
b9dc7755917b72f0d10994ff3c3b0967
-
SHA1
0fd11391981f7e640a708595f468a5687ddd1652
-
SHA256
92a8bd87031e9e9d39ff15152ffe18e5a5f5a15888f106c1d4bee17cca925862
-
SHA512
7f9f97acd1a5766b256bff3113ffe866698e341607c862932a3338da949a260b3f1adb9bef6cb25b559e3302c1f9a9aea7dbbdbd8f5c23264055243997f70383
-
SSDEEP
6144:28q6lhkFDjfSoyCFEvd/5kLAMJP7a9vk51/Oo4QDO4YuxnlbR5ggVL7h:3q68DDSzQGd/5kLA2P7a9vK1l4Q6y3V
Static task
static1
Behavioral task
behavioral1
Sample
b9dc7755917b72f0d10994ff3c3b0967_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Targets
-
-
Target
b9dc7755917b72f0d10994ff3c3b0967_JaffaCakes118
-
Size
426KB
-
MD5
b9dc7755917b72f0d10994ff3c3b0967
-
SHA1
0fd11391981f7e640a708595f468a5687ddd1652
-
SHA256
92a8bd87031e9e9d39ff15152ffe18e5a5f5a15888f106c1d4bee17cca925862
-
SHA512
7f9f97acd1a5766b256bff3113ffe866698e341607c862932a3338da949a260b3f1adb9bef6cb25b559e3302c1f9a9aea7dbbdbd8f5c23264055243997f70383
-
SSDEEP
6144:28q6lhkFDjfSoyCFEvd/5kLAMJP7a9vk51/Oo4QDO4YuxnlbR5ggVL7h:3q68DDSzQGd/5kLA2P7a9vK1l4Q6y3V
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-