General

  • Target

    3f54cf49a3cdb7e31adb4344c4d9ccc1_JaffaCakes118

  • Size

    152KB

  • Sample

    240712-3n2wnsyapd

  • MD5

    3f54cf49a3cdb7e31adb4344c4d9ccc1

  • SHA1

    56d1722c2c3b8b43fa655a47f225c95365dd516d

  • SHA256

    2a026851bb1823183309280d79d3cd538accf6065e334f6831d2c1bed7f427ee

  • SHA512

    1588715102c1118b6d4464cd1d0229eac687678964d55d56a7a6ee83ecaff3608bc734127a548b5df9ee948a225c08b1b13058f18c539aec09e8a56efd8c1a20

  • SSDEEP

    3072:UIShlddwUwri6UDFX3h707E/sCoGRyicGmByYKtHn:xUdwUwu6YFOo/siM3s

Score
7/10

Malware Config

Targets

    • Target

      3f54cf49a3cdb7e31adb4344c4d9ccc1_JaffaCakes118

    • Size

      152KB

    • MD5

      3f54cf49a3cdb7e31adb4344c4d9ccc1

    • SHA1

      56d1722c2c3b8b43fa655a47f225c95365dd516d

    • SHA256

      2a026851bb1823183309280d79d3cd538accf6065e334f6831d2c1bed7f427ee

    • SHA512

      1588715102c1118b6d4464cd1d0229eac687678964d55d56a7a6ee83ecaff3608bc734127a548b5df9ee948a225c08b1b13058f18c539aec09e8a56efd8c1a20

    • SSDEEP

      3072:UIShlddwUwri6UDFX3h707E/sCoGRyicGmByYKtHn:xUdwUwu6YFOo/siM3s

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks