General
-
Target
JaffaCakes118_60e97855390ec54f42e0eed0214eefd3
-
Size
98KB
-
Sample
250101-1y6aqsxjas
-
MD5
60e97855390ec54f42e0eed0214eefd3
-
SHA1
fb8920870430261294ba0b417f4ea047b9c7b49c
-
SHA256
252ebbc2fcd881312157fa2b911affed397d5e082fd85a54a5ed4227a59b2b06
-
SHA512
8602e4df4cef5772ae7858455d62aeef256f37b078cab0413dd73eec3f4df9659d9f0ef41ed88ed8e6d227f0b4155f900927ad66bf92d8421c639a4346e6b34c
-
SSDEEP
1536:sTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmFOcVf2nxqG0/7vdIgJ:sTs3BxJNmJIxqdLdT/ZzmEZxqdLdDJ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_60e97855390ec54f42e0eed0214eefd3.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
JaffaCakes118_60e97855390ec54f42e0eed0214eefd3
-
Size
98KB
-
MD5
60e97855390ec54f42e0eed0214eefd3
-
SHA1
fb8920870430261294ba0b417f4ea047b9c7b49c
-
SHA256
252ebbc2fcd881312157fa2b911affed397d5e082fd85a54a5ed4227a59b2b06
-
SHA512
8602e4df4cef5772ae7858455d62aeef256f37b078cab0413dd73eec3f4df9659d9f0ef41ed88ed8e6d227f0b4155f900927ad66bf92d8421c639a4346e6b34c
-
SSDEEP
1536:sTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmFOcVf2nxqG0/7vdIgJ:sTs3BxJNmJIxqdLdT/ZzmEZxqdLdDJ
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1