General
-
Target
a9b4b9ff17593fd87083c13f7701fdbf_JaffaCakes118
-
Size
35KB
-
Sample
240819-fsj54ayhrk
-
MD5
a9b4b9ff17593fd87083c13f7701fdbf
-
SHA1
75a1c690ddb6297fa34fd2e1c9e14691f45b140d
-
SHA256
09e58cfd09e6a33e7e2cfc07464dc792ee12069fb6c63756c9f7e9f26e5d0118
-
SHA512
49a74ba5ce1085cc5d001840188df0d95fd3b66b11f339b5970063c3ae7862451efcd4f14f447a20dd9632f95777053c4ddce4bd1c6aae5f333a207ccad523fa
-
SSDEEP
768:y0wEd+cgWbfo69AvY+4V/6qN2V3E+zQFE:y0tdRgWzh+vYVV/5N2ZXF
Static task
static1
Behavioral task
behavioral1
Sample
a9b4b9ff17593fd87083c13f7701fdbf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a9b4b9ff17593fd87083c13f7701fdbf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
a9b4b9ff17593fd87083c13f7701fdbf_JaffaCakes118
-
Size
35KB
-
MD5
a9b4b9ff17593fd87083c13f7701fdbf
-
SHA1
75a1c690ddb6297fa34fd2e1c9e14691f45b140d
-
SHA256
09e58cfd09e6a33e7e2cfc07464dc792ee12069fb6c63756c9f7e9f26e5d0118
-
SHA512
49a74ba5ce1085cc5d001840188df0d95fd3b66b11f339b5970063c3ae7862451efcd4f14f447a20dd9632f95777053c4ddce4bd1c6aae5f333a207ccad523fa
-
SSDEEP
768:y0wEd+cgWbfo69AvY+4V/6qN2V3E+zQFE:y0tdRgWzh+vYVV/5N2ZXF
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-