General
-
Target
016c4bd828d972eccf960925ea52442e_JaffaCakes118
-
Size
640KB
-
Sample
240620-ar5gratbjq
-
MD5
016c4bd828d972eccf960925ea52442e
-
SHA1
9d5b6692b540f5dfb3b4066f4bf82837028c5f43
-
SHA256
14dbcc79cf7594a35d355e95daa1162b26e3ab5e41872d59e535e96b8fb3747d
-
SHA512
3d59ec58ffcf28a8b643a04a7995da63ebc07f45ac02e712818f96f4510f585da2f63de4f1be41f160e69e0df2f0553ee66be422f109ab13fa0410b9bcd61ed6
-
SSDEEP
12288:zumKvEAK0WVITRJAdORqvTfIjngQejW9FlIXMNaQ4ppdJN9IJap2:8MAE4RJAdAqvj69FuXKWmJa4
Static task
static1
Behavioral task
behavioral1
Sample
016c4bd828d972eccf960925ea52442e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
016c4bd828d972eccf960925ea52442e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
016c4bd828d972eccf960925ea52442e_JaffaCakes118
-
Size
640KB
-
MD5
016c4bd828d972eccf960925ea52442e
-
SHA1
9d5b6692b540f5dfb3b4066f4bf82837028c5f43
-
SHA256
14dbcc79cf7594a35d355e95daa1162b26e3ab5e41872d59e535e96b8fb3747d
-
SHA512
3d59ec58ffcf28a8b643a04a7995da63ebc07f45ac02e712818f96f4510f585da2f63de4f1be41f160e69e0df2f0553ee66be422f109ab13fa0410b9bcd61ed6
-
SSDEEP
12288:zumKvEAK0WVITRJAdORqvTfIjngQejW9FlIXMNaQ4ppdJN9IJap2:8MAE4RJAdAqvj69FuXKWmJa4
Score10/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-