General
-
Target
14bfa0b873aea34715102981301c22b6_JaffaCakes118
-
Size
1.2MB
-
Sample
240627-fjpdfstbkd
-
MD5
14bfa0b873aea34715102981301c22b6
-
SHA1
a780f19be3961fc97c936591ff4598ee217766f0
-
SHA256
45039f4abca7cf477627a7e3fb512d3a8f6e898141aa0c59448049f35aa327fc
-
SHA512
8141c852e17453d9d14dd5a0dfadb6e55924aeb0d2324b0688323f0e6d4ee54694ecf93519d68d7219c44e1f7afaf4f0f4c50219ef1d80c21158ecc6391700d4
-
SSDEEP
12288:CrLVZU+/jedzCEabvIYj5kyESeQIGXCQcAatjuWNftoI96j83FqAmvwnFf/V3rbY:uLVKsREjQgXrv4AmYjPZinn9
Static task
static1
Behavioral task
behavioral1
Sample
14bfa0b873aea34715102981301c22b6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14bfa0b873aea34715102981301c22b6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
14bfa0b873aea34715102981301c22b6_JaffaCakes118
-
Size
1.2MB
-
MD5
14bfa0b873aea34715102981301c22b6
-
SHA1
a780f19be3961fc97c936591ff4598ee217766f0
-
SHA256
45039f4abca7cf477627a7e3fb512d3a8f6e898141aa0c59448049f35aa327fc
-
SHA512
8141c852e17453d9d14dd5a0dfadb6e55924aeb0d2324b0688323f0e6d4ee54694ecf93519d68d7219c44e1f7afaf4f0f4c50219ef1d80c21158ecc6391700d4
-
SSDEEP
12288:CrLVZU+/jedzCEabvIYj5kyESeQIGXCQcAatjuWNftoI96j83FqAmvwnFf/V3rbY:uLVKsREjQgXrv4AmYjPZinn9
Score10/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-