General
-
Target
6b1e52189d142ece69cf69d8e3ac4903_JaffaCakes118
-
Size
936KB
-
Sample
241022-s44p4avbmn
-
MD5
6b1e52189d142ece69cf69d8e3ac4903
-
SHA1
64ddf3aeabe3613fecaf6462c34267600e3c5e7f
-
SHA256
a3bc3b95e34c4af5ef5ce5b80d682061748248ffa6f2cb7a1b0e35c10dcd202c
-
SHA512
85e1bec6055a24116a41fd93b0f12fe5ae397425f978980d4a5a1dcfc035ca5fa14da21003fdf68c5a13c80598fb506b59590b7d712679f3901129c5673ae5d8
-
SSDEEP
6144:oV1iPtoCSnriBR0dS2n6625qxe9ZlBDjRAZwoACU/xDLDvw:obiPtoCSyIS2nSJ9jR9LZvvw
Behavioral task
behavioral1
Sample
6b1e52189d142ece69cf69d8e3ac4903_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
6b1e52189d142ece69cf69d8e3ac4903_JaffaCakes118
-
Size
936KB
-
MD5
6b1e52189d142ece69cf69d8e3ac4903
-
SHA1
64ddf3aeabe3613fecaf6462c34267600e3c5e7f
-
SHA256
a3bc3b95e34c4af5ef5ce5b80d682061748248ffa6f2cb7a1b0e35c10dcd202c
-
SHA512
85e1bec6055a24116a41fd93b0f12fe5ae397425f978980d4a5a1dcfc035ca5fa14da21003fdf68c5a13c80598fb506b59590b7d712679f3901129c5673ae5d8
-
SSDEEP
6144:oV1iPtoCSnriBR0dS2n6625qxe9ZlBDjRAZwoACU/xDLDvw:obiPtoCSyIS2nSJ9jR9LZvvw
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-