General
-
Target
319fa7ff58d5c8055cebe0fd0c0dee80_JaffaCakes118
-
Size
1.2MB
-
Sample
240709-xwes8asbpd
-
MD5
319fa7ff58d5c8055cebe0fd0c0dee80
-
SHA1
de943206374bc19a36d049eb762c9669cdc9ff78
-
SHA256
620cfbd9d12bc3fdac2eabaedfa1d102ef37db5a665b901636a3c73a9c1d741f
-
SHA512
41a4f99c1454bebf101bd924ce520ee90b80824aaac381f88c584511b675876ee8b09b01da1ad332eb6d32ac0f529ce83955ba2196a208f7ddffb988660753df
-
SSDEEP
12288:X28ris3mZ7XNyodemoj6jRPLjRPqjBjjyjBjBjBjBjLjObwB2WC4AigRkmYu+BCw:o4mZ7XJ70bwB2J0aYuyeDvD
Static task
static1
Behavioral task
behavioral1
Sample
319fa7ff58d5c8055cebe0fd0c0dee80_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
319fa7ff58d5c8055cebe0fd0c0dee80_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
319fa7ff58d5c8055cebe0fd0c0dee80_JaffaCakes118
-
Size
1.2MB
-
MD5
319fa7ff58d5c8055cebe0fd0c0dee80
-
SHA1
de943206374bc19a36d049eb762c9669cdc9ff78
-
SHA256
620cfbd9d12bc3fdac2eabaedfa1d102ef37db5a665b901636a3c73a9c1d741f
-
SHA512
41a4f99c1454bebf101bd924ce520ee90b80824aaac381f88c584511b675876ee8b09b01da1ad332eb6d32ac0f529ce83955ba2196a208f7ddffb988660753df
-
SSDEEP
12288:X28ris3mZ7XNyodemoj6jRPLjRPqjBjjyjBjBjBjBjLjObwB2WC4AigRkmYu+BCw:o4mZ7XJ70bwB2J0aYuyeDvD
Score9/10-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-