General
-
Target
2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118
-
Size
79KB
-
Sample
240708-hg9mqaxcjr
-
MD5
2b5ae11e52244db3aa2ce507db68e747
-
SHA1
c35620ebf0e3c41b8851a8eb7f13c9e26a14a764
-
SHA256
412a4539502b7577f57e3a42c10738fb4d7bd3c6581129dd452da20e817a0f1a
-
SHA512
be0a22a0a3a26fb0dd49c688d9f9560699b5f32dc213781bb6b2fc42909df9b2f7173ce0b500bf4a22d9d0360727e15b267368639729dada23d3cfc6bb1f4c07
-
SSDEEP
1536:tZlDZ/rPNiONuOoFh3uXz1hgU9Evkc/EjisEn/0iVvPpQ1n/:nzhHoFh+X39lixn/0iNe
Static task
static1
Behavioral task
behavioral1
Sample
2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118
-
Size
79KB
-
MD5
2b5ae11e52244db3aa2ce507db68e747
-
SHA1
c35620ebf0e3c41b8851a8eb7f13c9e26a14a764
-
SHA256
412a4539502b7577f57e3a42c10738fb4d7bd3c6581129dd452da20e817a0f1a
-
SHA512
be0a22a0a3a26fb0dd49c688d9f9560699b5f32dc213781bb6b2fc42909df9b2f7173ce0b500bf4a22d9d0360727e15b267368639729dada23d3cfc6bb1f4c07
-
SSDEEP
1536:tZlDZ/rPNiONuOoFh3uXz1hgU9Evkc/EjisEn/0iVvPpQ1n/:nzhHoFh+X39lixn/0iNe
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-