General
-
Target
b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118
-
Size
416KB
-
Sample
240820-2kpaqs1bpq
-
MD5
b11f04b1796fe2b24a5428960e3ee26e
-
SHA1
d160c0ec90b7c02a4339da428616c65b2c5a91ba
-
SHA256
5d12d8c7d715e980111ec339f59ca8f8c34adec411d53fd3531be9819d5b3251
-
SHA512
b48eeb0676c8e7ecd6dd2b21ececf4b3936ecd445248e33203942c704c1fe24fdfb18f95bd01ab89d1e753a187217a439e77d4e090fd6d471acc16025d0efd48
-
SSDEEP
12288:+HuaNL06AzT4OlWNDQ1YRVtWl8YKPHMWVoS:+Oa4s60AY/tWlbKPHM
Behavioral task
behavioral1
Sample
b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118
-
Size
416KB
-
MD5
b11f04b1796fe2b24a5428960e3ee26e
-
SHA1
d160c0ec90b7c02a4339da428616c65b2c5a91ba
-
SHA256
5d12d8c7d715e980111ec339f59ca8f8c34adec411d53fd3531be9819d5b3251
-
SHA512
b48eeb0676c8e7ecd6dd2b21ececf4b3936ecd445248e33203942c704c1fe24fdfb18f95bd01ab89d1e753a187217a439e77d4e090fd6d471acc16025d0efd48
-
SSDEEP
12288:+HuaNL06AzT4OlWNDQ1YRVtWl8YKPHMWVoS:+Oa4s60AY/tWlbKPHM
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-