General
-
Target
c2a86d2b895b89d4474289df2b979749_JaffaCakes118
-
Size
664KB
-
Sample
240826-kqfgcavfjc
-
MD5
c2a86d2b895b89d4474289df2b979749
-
SHA1
767c18a03e9c33e013aebcd606fec9b93b94ddc3
-
SHA256
13719ef1a5db09a956e033e1f76b225e8fa423b1b0a0b04ab424e3da9c3c6bfc
-
SHA512
4ad5b65424af3019e694729712511fae01872a34635e459f7cd8ea7eaafa98beceb2fd5e1baddd882ffaa9892a28da5a65f2fae6cb52e488f37749cead1a0c62
-
SSDEEP
12288:En9AOtYm1B8zUbWBJERZPoWaerkxBjUKIijHFG1B105/7vCWd4YiyoN+Ri28yCfT:EyLmP/I/9jH+ds
Static task
static1
Behavioral task
behavioral1
Sample
c2a86d2b895b89d4474289df2b979749_JaffaCakes118.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
c2a86d2b895b89d4474289df2b979749_JaffaCakes118
-
Size
664KB
-
MD5
c2a86d2b895b89d4474289df2b979749
-
SHA1
767c18a03e9c33e013aebcd606fec9b93b94ddc3
-
SHA256
13719ef1a5db09a956e033e1f76b225e8fa423b1b0a0b04ab424e3da9c3c6bfc
-
SHA512
4ad5b65424af3019e694729712511fae01872a34635e459f7cd8ea7eaafa98beceb2fd5e1baddd882ffaa9892a28da5a65f2fae6cb52e488f37749cead1a0c62
-
SSDEEP
12288:En9AOtYm1B8zUbWBJERZPoWaerkxBjUKIijHFG1B105/7vCWd4YiyoN+Ri28yCfT:EyLmP/I/9jH+ds
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-