General
-
Target
022c5069fda108892259bc8c69e7a156_JaffaCakes118
-
Size
992KB
-
Sample
240622-pylqjsycrc
-
MD5
022c5069fda108892259bc8c69e7a156
-
SHA1
0a207a85690444df224ea3fd0c798bbb87c2230e
-
SHA256
0ea12df170175a98f120d5a164166c23e653fa365bf0210b2afb390ca49c4212
-
SHA512
82979d4d2ce780da195c4fc667c422006e3bab5a143e410418fedc5289972097ee9dcfca6ac56f435f26ae5b2d6dc49566b7b55013a88397756a35a6a690ca25
-
SSDEEP
24576:/6N4QRDMo8xW2CBRzmFUShpZMAKDJGlrWv79j0V7efdv:/24wMZW9mF73aD2Sv7Fnlv
Static task
static1
Behavioral task
behavioral1
Sample
022c5069fda108892259bc8c69e7a156_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Targets
-
-
Target
022c5069fda108892259bc8c69e7a156_JaffaCakes118
-
Size
992KB
-
MD5
022c5069fda108892259bc8c69e7a156
-
SHA1
0a207a85690444df224ea3fd0c798bbb87c2230e
-
SHA256
0ea12df170175a98f120d5a164166c23e653fa365bf0210b2afb390ca49c4212
-
SHA512
82979d4d2ce780da195c4fc667c422006e3bab5a143e410418fedc5289972097ee9dcfca6ac56f435f26ae5b2d6dc49566b7b55013a88397756a35a6a690ca25
-
SSDEEP
24576:/6N4QRDMo8xW2CBRzmFUShpZMAKDJGlrWv79j0V7efdv:/24wMZW9mF73aD2Sv7Fnlv
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-