General
-
Target
0c1c2437f349eb85dbb0c72cf102024b_JaffaCakes118
-
Size
1.3MB
-
Sample
241002-xt72zssbkn
-
MD5
0c1c2437f349eb85dbb0c72cf102024b
-
SHA1
aff8c57c22f088327814f563074d92b1d14f89a4
-
SHA256
cd5bf8da3750cffec1d2cbd37d7dc6c0cb894c45bedad5ae320539932be1f56f
-
SHA512
7159588d39d804921d59a72b85643d1e97f47f8c16ecf72ab910eac78acd5ec6aa44990d749079683838e167af4f568ff2906773da4982e2680ba1ef558b3ef9
-
SSDEEP
24576:GvwQyBaWnBCqyaaNCM2OAjfXQLCDpavxhrTaqbHLMvdURlqccnL:GvlyBaWntyrNBlAzXQO9QB+2Mvq8L
Static task
static1
Behavioral task
behavioral1
Sample
0c1c2437f349eb85dbb0c72cf102024b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c1c2437f349eb85dbb0c72cf102024b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
0c1c2437f349eb85dbb0c72cf102024b_JaffaCakes118
-
Size
1.3MB
-
MD5
0c1c2437f349eb85dbb0c72cf102024b
-
SHA1
aff8c57c22f088327814f563074d92b1d14f89a4
-
SHA256
cd5bf8da3750cffec1d2cbd37d7dc6c0cb894c45bedad5ae320539932be1f56f
-
SHA512
7159588d39d804921d59a72b85643d1e97f47f8c16ecf72ab910eac78acd5ec6aa44990d749079683838e167af4f568ff2906773da4982e2680ba1ef558b3ef9
-
SSDEEP
24576:GvwQyBaWnBCqyaaNCM2OAjfXQLCDpavxhrTaqbHLMvdURlqccnL:GvlyBaWntyrNBlAzXQO9QB+2Mvq8L
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-