General
-
Target
696690f4d6e57bedf763ea5accc0dfbc_JaffaCakes118
-
Size
504KB
-
Sample
241022-hr4t8aveql
-
MD5
696690f4d6e57bedf763ea5accc0dfbc
-
SHA1
cfc33eac44ff9e0ef45ae719b506878d5bf52564
-
SHA256
e972b00dfc0f4b8243b4be1aebc42483c078a593028d7276ab0829e9dd4f4a24
-
SHA512
5d99e3abc87d3adaa73d6cefedb6772556e5b8e485ff2918a3c3e2ee40ceb7aef897a678543174c9db2a34c17d1889140925fd569cdc40b680f593090b752228
-
SSDEEP
12288:0BEuMGJG6yK73G11s8WzsTd4UL6t8YRLzzmPT6Sl:0yZGJfyKjGD8z0dlWLzzmP
Static task
static1
Behavioral task
behavioral1
Sample
696690f4d6e57bedf763ea5accc0dfbc_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
696690f4d6e57bedf763ea5accc0dfbc_JaffaCakes118
-
Size
504KB
-
MD5
696690f4d6e57bedf763ea5accc0dfbc
-
SHA1
cfc33eac44ff9e0ef45ae719b506878d5bf52564
-
SHA256
e972b00dfc0f4b8243b4be1aebc42483c078a593028d7276ab0829e9dd4f4a24
-
SHA512
5d99e3abc87d3adaa73d6cefedb6772556e5b8e485ff2918a3c3e2ee40ceb7aef897a678543174c9db2a34c17d1889140925fd569cdc40b680f593090b752228
-
SSDEEP
12288:0BEuMGJG6yK73G11s8WzsTd4UL6t8YRLzzmPT6Sl:0yZGJfyKjGD8z0dlWLzzmP
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-