General
-
Target
475ed004da785a249ba1a537a5a91f46_JaffaCakes118
-
Size
1.4MB
-
Sample
241015-mv5cdatgql
-
MD5
475ed004da785a249ba1a537a5a91f46
-
SHA1
1845ce0b33790401c02ae2bc4c921e4b67d62d92
-
SHA256
7b57f2c1e6199c2973acf6527a75a5f2c233e5f3c309a07737c230706eb411e0
-
SHA512
8a72b97ee212113ec9866880ca06f69b68cb490da87b460efc6606095058508a0e6bae6c9c46692c84b8dde9366cca7470602fb7cea78dfcf0ae4be7d349cd8e
-
SSDEEP
24576:Q/ZBumSO9V6T6gfa4+hqUM4/JibT5cbC:Q/rpgA/BJio
Static task
static1
Behavioral task
behavioral1
Sample
475ed004da785a249ba1a537a5a91f46_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
475ed004da785a249ba1a537a5a91f46_JaffaCakes118
-
Size
1.4MB
-
MD5
475ed004da785a249ba1a537a5a91f46
-
SHA1
1845ce0b33790401c02ae2bc4c921e4b67d62d92
-
SHA256
7b57f2c1e6199c2973acf6527a75a5f2c233e5f3c309a07737c230706eb411e0
-
SHA512
8a72b97ee212113ec9866880ca06f69b68cb490da87b460efc6606095058508a0e6bae6c9c46692c84b8dde9366cca7470602fb7cea78dfcf0ae4be7d349cd8e
-
SSDEEP
24576:Q/ZBumSO9V6T6gfa4+hqUM4/JibT5cbC:Q/rpgA/BJio
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-