General
-
Target
f85dfc489703acfa80a5dfd5cc3b17bc_JaffaCakes118
-
Size
7.0MB
-
Sample
240926-plg7laxajk
-
MD5
f85dfc489703acfa80a5dfd5cc3b17bc
-
SHA1
92c99a57d0a1dedc71e39516d3a497b7d8ccad11
-
SHA256
3b234aa87b4769149108bfe14be22a72158663a42f5589fd5904b1daacd587b8
-
SHA512
db25ca08896e66d20a90775f3b3bffd7491e7fffc5804e7ccd89563624c3103dc7e99b7761b77e8fa64b6025ed5ac3a724696a321203ed71d6c43f0b0b950f3b
-
SSDEEP
196608:SjRHt1LtqHQgt9mRSK0gbNn1gME1lnj2kaaYaQ3Z:ERXEwugoK0SuVNjaTt
Static task
static1
Behavioral task
behavioral1
Sample
f85dfc489703acfa80a5dfd5cc3b17bc_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f85dfc489703acfa80a5dfd5cc3b17bc_JaffaCakes118
-
Size
7.0MB
-
MD5
f85dfc489703acfa80a5dfd5cc3b17bc
-
SHA1
92c99a57d0a1dedc71e39516d3a497b7d8ccad11
-
SHA256
3b234aa87b4769149108bfe14be22a72158663a42f5589fd5904b1daacd587b8
-
SHA512
db25ca08896e66d20a90775f3b3bffd7491e7fffc5804e7ccd89563624c3103dc7e99b7761b77e8fa64b6025ed5ac3a724696a321203ed71d6c43f0b0b950f3b
-
SSDEEP
196608:SjRHt1LtqHQgt9mRSK0gbNn1gME1lnj2kaaYaQ3Z:ERXEwugoK0SuVNjaTt
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2