General
-
Target
0a660553b1d746103077a2520e338dbd_JaffaCakes118
-
Size
1.8MB
-
Sample
241002-nf7pmataql
-
MD5
0a660553b1d746103077a2520e338dbd
-
SHA1
9972ce46350864c161897b771ed76245ce2476ff
-
SHA256
22846ada9d2a89030fd6dd14b1e9297b751208ad2b462b1fe19a82cf60425576
-
SHA512
88154a3006f287cc3c754f608d5fa33df623433697a0107cd3b110a223218ed38f2323bebd08b05bf8bc3ff3adee7581ada578959f98749595f6a83ea695a760
-
SSDEEP
49152:UnxM9wJPNVExkHsFdu1GSjc1j56s4yhc:wyUPQWHqu1Ljc1j5Jc
Static task
static1
Behavioral task
behavioral1
Sample
0a660553b1d746103077a2520e338dbd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a660553b1d746103077a2520e338dbd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
0a660553b1d746103077a2520e338dbd_JaffaCakes118
-
Size
1.8MB
-
MD5
0a660553b1d746103077a2520e338dbd
-
SHA1
9972ce46350864c161897b771ed76245ce2476ff
-
SHA256
22846ada9d2a89030fd6dd14b1e9297b751208ad2b462b1fe19a82cf60425576
-
SHA512
88154a3006f287cc3c754f608d5fa33df623433697a0107cd3b110a223218ed38f2323bebd08b05bf8bc3ff3adee7581ada578959f98749595f6a83ea695a760
-
SSDEEP
49152:UnxM9wJPNVExkHsFdu1GSjc1j56s4yhc:wyUPQWHqu1Ljc1j5Jc
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Virtualization/Sandbox Evasion
2