General
-
Target
be65ed21e0a1409a90a487e7622ce06e_JaffaCakes118
-
Size
137KB
-
Sample
240824-mgk2ksxdnm
-
MD5
be65ed21e0a1409a90a487e7622ce06e
-
SHA1
dd877dd25ac6107f3d1194ae1aa4509481dffa01
-
SHA256
083d772776f699f4ed6720b29f608e4f9b425fcf8fce8fd9a6a75c0ab3a544ee
-
SHA512
3d7bad0641f6c12cef4c897fcc09669370ab41c614efa48e5729d117f74f91a74f0081bc1755e3f674f79edf54f73d83fce6ce037b4ba29e25a119c74d53a881
-
SSDEEP
3072:qtT8HbO3YH9sLZ2I6UdSpP08dezPj6IKnPRT9CUPLX4a:TQRIIRda8JqIERToUPL
Behavioral task
behavioral1
Sample
be65ed21e0a1409a90a487e7622ce06e_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
be65ed21e0a1409a90a487e7622ce06e_JaffaCakes118
-
Size
137KB
-
MD5
be65ed21e0a1409a90a487e7622ce06e
-
SHA1
dd877dd25ac6107f3d1194ae1aa4509481dffa01
-
SHA256
083d772776f699f4ed6720b29f608e4f9b425fcf8fce8fd9a6a75c0ab3a544ee
-
SHA512
3d7bad0641f6c12cef4c897fcc09669370ab41c614efa48e5729d117f74f91a74f0081bc1755e3f674f79edf54f73d83fce6ce037b4ba29e25a119c74d53a881
-
SSDEEP
3072:qtT8HbO3YH9sLZ2I6UdSpP08dezPj6IKnPRT9CUPLX4a:TQRIIRda8JqIERToUPL
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-