General
-
Target
3f54cf49a3cdb7e31adb4344c4d9ccc1_JaffaCakes118
-
Size
152KB
-
Sample
240712-3n2wnsyapd
-
MD5
3f54cf49a3cdb7e31adb4344c4d9ccc1
-
SHA1
56d1722c2c3b8b43fa655a47f225c95365dd516d
-
SHA256
2a026851bb1823183309280d79d3cd538accf6065e334f6831d2c1bed7f427ee
-
SHA512
1588715102c1118b6d4464cd1d0229eac687678964d55d56a7a6ee83ecaff3608bc734127a548b5df9ee948a225c08b1b13058f18c539aec09e8a56efd8c1a20
-
SSDEEP
3072:UIShlddwUwri6UDFX3h707E/sCoGRyicGmByYKtHn:xUdwUwu6YFOo/siM3s
Static task
static1
Behavioral task
behavioral1
Sample
3f54cf49a3cdb7e31adb4344c4d9ccc1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f54cf49a3cdb7e31adb4344c4d9ccc1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
3f54cf49a3cdb7e31adb4344c4d9ccc1_JaffaCakes118
-
Size
152KB
-
MD5
3f54cf49a3cdb7e31adb4344c4d9ccc1
-
SHA1
56d1722c2c3b8b43fa655a47f225c95365dd516d
-
SHA256
2a026851bb1823183309280d79d3cd538accf6065e334f6831d2c1bed7f427ee
-
SHA512
1588715102c1118b6d4464cd1d0229eac687678964d55d56a7a6ee83ecaff3608bc734127a548b5df9ee948a225c08b1b13058f18c539aec09e8a56efd8c1a20
-
SSDEEP
3072:UIShlddwUwri6UDFX3h707E/sCoGRyicGmByYKtHn:xUdwUwu6YFOo/siM3s
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-