General
-
Target
00dd887d9830825f2e8d390337ea0c9e_JaffaCakes118
-
Size
293KB
-
Sample
240622-cww3aatbkc
-
MD5
00dd887d9830825f2e8d390337ea0c9e
-
SHA1
25f55e844050f438055b7f4ea7bbc50dc6879c88
-
SHA256
0a4dca1f1c91d9f1dffcdc7b5b0ffe532015c6a428abac554830ed07e605f950
-
SHA512
24e3bba9fca9978c5d4c210b3f7145607f376254eb79901dd7dcc346d9e8f5ece34257c866b5ea6ca6fda340ec411fd2f5243206349f67b35d4000e1236174bf
-
SSDEEP
6144:IJVEe3bRD1y3VMRO6+VvDORMfS2PG2KEG6fzjVYp3DI:IJVL3bRDGVMRatOR6PLpvVYpc
Static task
static1
Behavioral task
behavioral1
Sample
00dd887d9830825f2e8d390337ea0c9e_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
00dd887d9830825f2e8d390337ea0c9e_JaffaCakes118
-
Size
293KB
-
MD5
00dd887d9830825f2e8d390337ea0c9e
-
SHA1
25f55e844050f438055b7f4ea7bbc50dc6879c88
-
SHA256
0a4dca1f1c91d9f1dffcdc7b5b0ffe532015c6a428abac554830ed07e605f950
-
SHA512
24e3bba9fca9978c5d4c210b3f7145607f376254eb79901dd7dcc346d9e8f5ece34257c866b5ea6ca6fda340ec411fd2f5243206349f67b35d4000e1236174bf
-
SSDEEP
6144:IJVEe3bRD1y3VMRO6+VvDORMfS2PG2KEG6fzjVYp3DI:IJVL3bRDGVMRatOR6PLpvVYpc
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-