General
-
Target
4450b7ed3dcc49322523497772b49eaa_JaffaCakes118
-
Size
309KB
-
Sample
241014-1jlyjsxgnh
-
MD5
4450b7ed3dcc49322523497772b49eaa
-
SHA1
db8b9a2ccaccdeabd5976d46f852cf46335ef298
-
SHA256
b493059f9888bce814ae0ff1af7416a6cd257af1616f82b32195b74bb81c3277
-
SHA512
4aaf0ab95dd731af9b029f787417863584f84c9edf8b10eb87ae81284910e340abb421c90c64c0d5fc61486511d3d941d59b823423a8795236f4b3847050b107
-
SSDEEP
6144:YhLa33FXP9i+XBz1HSQqSKS0LRmCRK53InEvL5qrfjbcWyt+B7a:eqhP9iGqSKZRvIInSgrfXFPB7a
Static task
static1
Behavioral task
behavioral1
Sample
4450b7ed3dcc49322523497772b49eaa_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
4450b7ed3dcc49322523497772b49eaa_JaffaCakes118
-
Size
309KB
-
MD5
4450b7ed3dcc49322523497772b49eaa
-
SHA1
db8b9a2ccaccdeabd5976d46f852cf46335ef298
-
SHA256
b493059f9888bce814ae0ff1af7416a6cd257af1616f82b32195b74bb81c3277
-
SHA512
4aaf0ab95dd731af9b029f787417863584f84c9edf8b10eb87ae81284910e340abb421c90c64c0d5fc61486511d3d941d59b823423a8795236f4b3847050b107
-
SSDEEP
6144:YhLa33FXP9i+XBz1HSQqSKS0LRmCRK53InEvL5qrfjbcWyt+B7a:eqhP9iGqSKZRvIInSgrfXFPB7a
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-