General
-
Target
66a296ff8e17020c80cc61f50931ff33_JaffaCakes118
-
Size
381KB
-
Sample
241021-ny1c9svblm
-
MD5
66a296ff8e17020c80cc61f50931ff33
-
SHA1
13b1b3a05a6bfe43e69ac419537509db02e675fb
-
SHA256
1172f9a769ad61689bddae58882645f5ccd37ed2881a096fe23d5c120ea20fff
-
SHA512
b2ad4f4ea38917bd85072bf590a5e3b305e11944581269fc142ebcf5fb15d456088695ae8c7c5ea7439cd72695a813368b706e4042522b0449a2666adfc97f49
-
SSDEEP
6144:0WVvUX3F1M4icY6u09Sr4RL3gs0P+CriXNBz3DHUEkzl8+We+atGKoS9:xilbcfMS0xg5PvOXN1UDlJJoKoS
Behavioral task
behavioral1
Sample
66a296ff8e17020c80cc61f50931ff33_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
66a296ff8e17020c80cc61f50931ff33_JaffaCakes118
-
Size
381KB
-
MD5
66a296ff8e17020c80cc61f50931ff33
-
SHA1
13b1b3a05a6bfe43e69ac419537509db02e675fb
-
SHA256
1172f9a769ad61689bddae58882645f5ccd37ed2881a096fe23d5c120ea20fff
-
SHA512
b2ad4f4ea38917bd85072bf590a5e3b305e11944581269fc142ebcf5fb15d456088695ae8c7c5ea7439cd72695a813368b706e4042522b0449a2666adfc97f49
-
SSDEEP
6144:0WVvUX3F1M4icY6u09Sr4RL3gs0P+CriXNBz3DHUEkzl8+We+atGKoS9:xilbcfMS0xg5PvOXN1UDlJJoKoS
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-