Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
0c23d28144ba960ed295d3f025dd264c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0c23d28144ba960ed295d3f025dd264c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0c23d28144ba960ed295d3f025dd264c_JaffaCakes118.exe
-
Size
32KB
-
MD5
0c23d28144ba960ed295d3f025dd264c
-
SHA1
250a18bbb60eddb1c1f8334146f40f2654c12a8f
-
SHA256
a90be6bd0f3d6d0ae3f76efb59e41ba43c31bd7cbb86cc9a8902d2120fab7139
-
SHA512
b0c6c1c29ef2d41f9e3929fa24b72bfce7e97b3154034eb1442958bd4bc925bae28672c6590221d01a5aea43490c7ecd4572bb4b1d8c328c4c085cbe2ec54bb6
-
SSDEEP
768:eKNx30nHU9ZgbwdvHNgn2H0g/N+bZiPNpl24X:ey3c09ZgbBnxgqZiVj24X
Malware Config
Extracted
Protocol: ftp- Host:
vladyan56.aiq.ru - Port:
21 - Username:
u350001 - Password:
l6zxtion
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0c23d28144ba960ed295d3f025dd264c_JaffaCakes118.exe