General
-
Target
d253016a6eaa8493ec95fb97c3e976d7_JaffaCakes118
-
Size
4.3MB
-
Sample
240907-tln3cssbnn
-
MD5
d253016a6eaa8493ec95fb97c3e976d7
-
SHA1
e7266637bdf4cdc1020b96fc9c70d3f9620f6a03
-
SHA256
02eb2b3bb2347bfa0a3b3f1c5a2d5688b9063c730f73487e9afdd7bcc2abb46d
-
SHA512
e01583e994ec1642e38e8e67208f3e88e976418269e55ab480dab595e887e9c7e3ce699a546edf59ac31a23814b8093a3ecd89d3191a5720d288ffe653030476
-
SSDEEP
98304:aqSh5zRZwYeMMIV3PsU6Z8y6TaOphYLYSHinQpUt/YV5DyzFf:ajHYOpCm/s9y
Static task
static1
Behavioral task
behavioral1
Sample
d253016a6eaa8493ec95fb97c3e976d7_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
d253016a6eaa8493ec95fb97c3e976d7_JaffaCakes118
-
Size
4.3MB
-
MD5
d253016a6eaa8493ec95fb97c3e976d7
-
SHA1
e7266637bdf4cdc1020b96fc9c70d3f9620f6a03
-
SHA256
02eb2b3bb2347bfa0a3b3f1c5a2d5688b9063c730f73487e9afdd7bcc2abb46d
-
SHA512
e01583e994ec1642e38e8e67208f3e88e976418269e55ab480dab595e887e9c7e3ce699a546edf59ac31a23814b8093a3ecd89d3191a5720d288ffe653030476
-
SSDEEP
98304:aqSh5zRZwYeMMIV3PsU6Z8y6TaOphYLYSHinQpUt/YV5DyzFf:ajHYOpCm/s9y
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3