General
-
Target
72912124de89e0086129e836194239ae_JaffaCakes118
-
Size
1.6MB
-
Sample
241024-gj89asyakm
-
MD5
72912124de89e0086129e836194239ae
-
SHA1
d3ae931046e2103b525fc5229dddf3d7de46a854
-
SHA256
7e8b21d56644cc0509e46e6f246a6f44b64be4325377569acedeba3f3cf339d6
-
SHA512
9d8e4bb75c9882a5db42d328f3a356f2b822b1bfd6e8fdddc739f0dcd08a0610e8b3c2c4f72924feea4fe4b5c78b159e2af429427aa51526a070aff6cee98707
-
SSDEEP
24576:ra0rsRzgekLnpwFCh6MPQd1ME+nr9JMSFWDV8q3k3Tj1TtR/K4JoerZxHt:2OKkLpECweASwVfk3Vvi8Lt
Static task
static1
Behavioral task
behavioral1
Sample
72912124de89e0086129e836194239ae_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
72912124de89e0086129e836194239ae_JaffaCakes118
-
Size
1.6MB
-
MD5
72912124de89e0086129e836194239ae
-
SHA1
d3ae931046e2103b525fc5229dddf3d7de46a854
-
SHA256
7e8b21d56644cc0509e46e6f246a6f44b64be4325377569acedeba3f3cf339d6
-
SHA512
9d8e4bb75c9882a5db42d328f3a356f2b822b1bfd6e8fdddc739f0dcd08a0610e8b3c2c4f72924feea4fe4b5c78b159e2af429427aa51526a070aff6cee98707
-
SSDEEP
24576:ra0rsRzgekLnpwFCh6MPQd1ME+nr9JMSFWDV8q3k3Tj1TtR/K4JoerZxHt:2OKkLpECweASwVfk3Vvi8Lt
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-