General
-
Target
19ae001aa6aba73bc7960b0d934f26f3_JaffaCakes118
-
Size
836KB
-
Sample
241006-zpaxssvfpp
-
MD5
19ae001aa6aba73bc7960b0d934f26f3
-
SHA1
ebf350e61b078a61023e42db09512949e87250a3
-
SHA256
ad7b7045a121cb8aa3ea841bf6a0471450d298c5ee86e34ee1e6b0086c9d7609
-
SHA512
a5495fb1bcdc9b26e2a5e7edc325fe4bd72f1f1d0c793659291e251fe4adc1f2ad066882cbb648777a253ca209416cca208f2fc34e7e97bd268052addef16e93
-
SSDEEP
12288:n2CoAv9i6/nmFmMPMj2hBLlUzBmug3+XCqyusCedzUs2CsArsyV:2mv86/nmFmu9FujCXCedRY+
Static task
static1
Behavioral task
behavioral1
Sample
19ae001aa6aba73bc7960b0d934f26f3_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
19ae001aa6aba73bc7960b0d934f26f3_JaffaCakes118
-
Size
836KB
-
MD5
19ae001aa6aba73bc7960b0d934f26f3
-
SHA1
ebf350e61b078a61023e42db09512949e87250a3
-
SHA256
ad7b7045a121cb8aa3ea841bf6a0471450d298c5ee86e34ee1e6b0086c9d7609
-
SHA512
a5495fb1bcdc9b26e2a5e7edc325fe4bd72f1f1d0c793659291e251fe4adc1f2ad066882cbb648777a253ca209416cca208f2fc34e7e97bd268052addef16e93
-
SSDEEP
12288:n2CoAv9i6/nmFmMPMj2hBLlUzBmug3+XCqyusCedzUs2CsArsyV:2mv86/nmFmu9FujCXCedRY+
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-