General

  • Target

    69a17741bd43a2004532c6ff52f42cf7_JaffaCakes118

  • Size

    4.3MB

  • Sample

    240724-a6v7ma1gne

  • MD5

    69a17741bd43a2004532c6ff52f42cf7

  • SHA1

    4a7ea7db2595f83f0aceb87b687c16f369c4ef7f

  • SHA256

    4a3d7c6b66ee0e818f5940aa41dd5a778e4ad8edc66cfe892996f6c4da417b1b

  • SHA512

    cf9f5a03716ae9a70f8603cd5a3cdff238ec1778c2902f22c10ec874bd202c03e1e6c75bc564544402eda738a0b4bbf1fba5e9bfc162698a4df65215913a86b5

  • SSDEEP

    98304:kaDc4W94xIK+wESdYgpIZb/mDkIPktyFF1gK59Pksq47QO6f40JTl:kaDS94xIFwE3q4b/mAJ4FFqoasqE0Vl

Malware Config

Targets

    • Target

      69a17741bd43a2004532c6ff52f42cf7_JaffaCakes118

    • Size

      4.3MB

    • MD5

      69a17741bd43a2004532c6ff52f42cf7

    • SHA1

      4a7ea7db2595f83f0aceb87b687c16f369c4ef7f

    • SHA256

      4a3d7c6b66ee0e818f5940aa41dd5a778e4ad8edc66cfe892996f6c4da417b1b

    • SHA512

      cf9f5a03716ae9a70f8603cd5a3cdff238ec1778c2902f22c10ec874bd202c03e1e6c75bc564544402eda738a0b4bbf1fba5e9bfc162698a4df65215913a86b5

    • SSDEEP

      98304:kaDc4W94xIK+wESdYgpIZb/mDkIPktyFF1gK59Pksq47QO6f40JTl:kaDS94xIFwE3q4b/mAJ4FFqoasqE0Vl

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks