General
-
Target
723dfeb45dd1904dd38c5859d7d4e1de_JaffaCakes118
-
Size
1.1MB
-
Sample
241024-elzrjavgqr
-
MD5
723dfeb45dd1904dd38c5859d7d4e1de
-
SHA1
df1109d3cd2e2bf5fe0e3ca4370eec2133784c5e
-
SHA256
baa8bd77550b16d4f317816b34f11ef434dda02f214f976fdab96fe41692fac1
-
SHA512
ebf0d205704744cf29149974a10c82d1dff1bbfafb9a400e8e09030659ace9eb9a2733b4477bea3f339fc7754150659c82a65838154025095afb11ba77a0e745
-
SSDEEP
24576:ppt/JvhyCrLrzpkx+4VOgwB5v9HTtsKevA+InGjPwaPV2jCU6yc+IcOLee:Dt/Jvhy4Lrzpkx+4VOgwB5v5xsKevA+R
Static task
static1
Behavioral task
behavioral1
Sample
723dfeb45dd1904dd38c5859d7d4e1de_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
723dfeb45dd1904dd38c5859d7d4e1de_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
723dfeb45dd1904dd38c5859d7d4e1de_JaffaCakes118
-
Size
1.1MB
-
MD5
723dfeb45dd1904dd38c5859d7d4e1de
-
SHA1
df1109d3cd2e2bf5fe0e3ca4370eec2133784c5e
-
SHA256
baa8bd77550b16d4f317816b34f11ef434dda02f214f976fdab96fe41692fac1
-
SHA512
ebf0d205704744cf29149974a10c82d1dff1bbfafb9a400e8e09030659ace9eb9a2733b4477bea3f339fc7754150659c82a65838154025095afb11ba77a0e745
-
SSDEEP
24576:ppt/JvhyCrLrzpkx+4VOgwB5v9HTtsKevA+InGjPwaPV2jCU6yc+IcOLee:Dt/Jvhy4Lrzpkx+4VOgwB5v5xsKevA+R
Score10/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-