General
-
Target
54effa8bd854d67f4fa94892ee26601a_JaffaCakes118
-
Size
1.1MB
-
Sample
241018-cq2qks1cnf
-
MD5
54effa8bd854d67f4fa94892ee26601a
-
SHA1
bafd531eac669520999c0160a5029b94ed69498a
-
SHA256
aa3df5a7ab7f2a616ea99c5d94ef451c9dbf4b3ecd0b65596a47eaabdcba7e2b
-
SHA512
7ea7cf4bb015af5205228e87afb1391d2260aebf879f41dd69bb6a35208e8b2f68cf207955fdac89c8504527839d6f245a526dfeb9c961715a722bdba1af82ed
-
SSDEEP
12288:R2eq/SnRNA7LvewpXgi4uzCYKfhV0MwGRpAipfpWUYGfqo9s/Yos7O2OVzYRokb:R2e47Xs9PbS/Yr+ouZ4zjskCp
Static task
static1
Behavioral task
behavioral1
Sample
54effa8bd854d67f4fa94892ee26601a_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
54effa8bd854d67f4fa94892ee26601a_JaffaCakes118
-
Size
1.1MB
-
MD5
54effa8bd854d67f4fa94892ee26601a
-
SHA1
bafd531eac669520999c0160a5029b94ed69498a
-
SHA256
aa3df5a7ab7f2a616ea99c5d94ef451c9dbf4b3ecd0b65596a47eaabdcba7e2b
-
SHA512
7ea7cf4bb015af5205228e87afb1391d2260aebf879f41dd69bb6a35208e8b2f68cf207955fdac89c8504527839d6f245a526dfeb9c961715a722bdba1af82ed
-
SSDEEP
12288:R2eq/SnRNA7LvewpXgi4uzCYKfhV0MwGRpAipfpWUYGfqo9s/Yos7O2OVzYRokb:R2e47Xs9PbS/Yr+ouZ4zjskCp
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-