Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 12:00
Behavioral task
behavioral1
Sample
e27f611b58c54c195dd169446f910f39_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e27f611b58c54c195dd169446f910f39_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e27f611b58c54c195dd169446f910f39_JaffaCakes118.exe
-
Size
5.8MB
-
MD5
e27f611b58c54c195dd169446f910f39
-
SHA1
42701017170cf3f72d6e9733195c0bccc49907fa
-
SHA256
2d7e884e652780ab3e988f180b7bdc38ec7f178b03fb2dede887c74df2196d81
-
SHA512
7d06cb408b73861dd419eb412307f7bd5674d556b4e5590b6efc05daf2ea8a2f8b16816bc2fa959959dffb9fd8f90698ff43f461f199ed62f2350c07a790b5e3
-
SSDEEP
98304:vj1FNIFlRjCLym0a6akne3mNYgm32L/1dNK3acECdB3m8qZY2C:b1FNIFlpeN6aknGaY/32LrIawdB3wQ
Malware Config
Extracted
pandastealer
1.11
http://a0565396.xsph.ru
Signatures
-
Panda Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/1188-0-0x0000000000A10000-0x00000000013D5000-memory.dmp family_pandastealer behavioral2/memory/1188-3-0x0000000000A10000-0x00000000013D5000-memory.dmp family_pandastealer behavioral2/memory/1188-41-0x0000000000A10000-0x00000000013D5000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1188-0-0x0000000000A10000-0x00000000013D5000-memory.dmp vmprotect behavioral2/memory/1188-3-0x0000000000A10000-0x00000000013D5000-memory.dmp vmprotect behavioral2/memory/1188-41-0x0000000000A10000-0x00000000013D5000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1188 e27f611b58c54c195dd169446f910f39_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1188 e27f611b58c54c195dd169446f910f39_JaffaCakes118.exe 1188 e27f611b58c54c195dd169446f910f39_JaffaCakes118.exe 1188 e27f611b58c54c195dd169446f910f39_JaffaCakes118.exe 1188 e27f611b58c54c195dd169446f910f39_JaffaCakes118.exe