General
-
Target
02ad49a9dede1de718ab115789e704e2_JaffaCakes118
-
Size
733KB
-
Sample
240622-r1vgkswdqj
-
MD5
02ad49a9dede1de718ab115789e704e2
-
SHA1
26a42b27495278a03342dd023f3326822666db6c
-
SHA256
055a65f16df18d4f0858e409a65f8976c41aa5aa4533745d318d5e0f00930243
-
SHA512
ab87713d6abf5eb82e0cea18aab7071f503050888996725d3fe8ff01eb0ae524cde89330f5ba2314f19c078889c797e33817d9b3b6580b31ab7cf09721351224
-
SSDEEP
6144:/uadIvhkUpx3YIrHTB6TGoY45ycBfTUOiSZq2h/srQtHxLl7WM7wwwwbq:/ul5kEokT8GoBxBT5XpgQHgMa
Static task
static1
Behavioral task
behavioral1
Sample
02ad49a9dede1de718ab115789e704e2_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
02ad49a9dede1de718ab115789e704e2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
02ad49a9dede1de718ab115789e704e2_JaffaCakes118
-
Size
733KB
-
MD5
02ad49a9dede1de718ab115789e704e2
-
SHA1
26a42b27495278a03342dd023f3326822666db6c
-
SHA256
055a65f16df18d4f0858e409a65f8976c41aa5aa4533745d318d5e0f00930243
-
SHA512
ab87713d6abf5eb82e0cea18aab7071f503050888996725d3fe8ff01eb0ae524cde89330f5ba2314f19c078889c797e33817d9b3b6580b31ab7cf09721351224
-
SSDEEP
6144:/uadIvhkUpx3YIrHTB6TGoY45ycBfTUOiSZq2h/srQtHxLl7WM7wwwwbq:/ul5kEokT8GoBxBT5XpgQHgMa
Score10/10-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-