General
-
Target
dc5cc070ea662794f72b8558bddf60f9_JaffaCakes118
-
Size
5.8MB
-
Sample
240912-qv4ydsxbpj
-
MD5
dc5cc070ea662794f72b8558bddf60f9
-
SHA1
ac7ff04ac89320a84be6f853191432a707d8181a
-
SHA256
3863361341fb271b432545c1806ea5444408bee164e18402b7b0d153c5cd4710
-
SHA512
152a317c81ec450a95781f74bc16563b2f9c564c3778f3b2cf9418cb7906da310647a84855d160af3069171336bb287a0b19c3d9b24038e2352762f61036ae5a
-
SSDEEP
98304:VanGfmTCkplMq4lAyurFzSyjjksnldSQmT4PU7MHT4PU7M9gN/YhGdwf:VanjALurZSyS/gN/IGOf
Static task
static1
Behavioral task
behavioral1
Sample
dc5cc070ea662794f72b8558bddf60f9_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
dc5cc070ea662794f72b8558bddf60f9_JaffaCakes118
-
Size
5.8MB
-
MD5
dc5cc070ea662794f72b8558bddf60f9
-
SHA1
ac7ff04ac89320a84be6f853191432a707d8181a
-
SHA256
3863361341fb271b432545c1806ea5444408bee164e18402b7b0d153c5cd4710
-
SHA512
152a317c81ec450a95781f74bc16563b2f9c564c3778f3b2cf9418cb7906da310647a84855d160af3069171336bb287a0b19c3d9b24038e2352762f61036ae5a
-
SSDEEP
98304:VanGfmTCkplMq4lAyurFzSyjjksnldSQmT4PU7MHT4PU7M9gN/YhGdwf:VanjALurZSyS/gN/IGOf
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3