General
-
Target
c2679c864a99ccc926d8d075e8d5cae6_JaffaCakes118
-
Size
4.0MB
-
Sample
240826-glk99aybqe
-
MD5
c2679c864a99ccc926d8d075e8d5cae6
-
SHA1
ac0bd541cc5c0e44b0b01b683dc70bfba04bfae4
-
SHA256
7381441c802c8fcfd6180757035c4a59587d32266f45d095c4b28d3825773623
-
SHA512
a8d222fb1b59c9993fc90cd8a89964df1b085363d72a2c470b0811818c1491b0a84dd9f84595364b09b8f6ec0a2a97a13fb08c08caa494b7ce72ca8a8b5f6680
-
SSDEEP
12288:tG9QQjb8Cw/xVJkw7bWk2UqbRA+dFiADbIO4CbySB/cZ6NJY8pqQUdqV/362MFsG:EE4au0ldX
Static task
static1
Behavioral task
behavioral1
Sample
c2679c864a99ccc926d8d075e8d5cae6_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
c2679c864a99ccc926d8d075e8d5cae6_JaffaCakes118
-
Size
4.0MB
-
MD5
c2679c864a99ccc926d8d075e8d5cae6
-
SHA1
ac0bd541cc5c0e44b0b01b683dc70bfba04bfae4
-
SHA256
7381441c802c8fcfd6180757035c4a59587d32266f45d095c4b28d3825773623
-
SHA512
a8d222fb1b59c9993fc90cd8a89964df1b085363d72a2c470b0811818c1491b0a84dd9f84595364b09b8f6ec0a2a97a13fb08c08caa494b7ce72ca8a8b5f6680
-
SSDEEP
12288:tG9QQjb8Cw/xVJkw7bWk2UqbRA+dFiADbIO4CbySB/cZ6NJY8pqQUdqV/362MFsG:EE4au0ldX
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-