Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 01:04
Behavioral task
behavioral1
Sample
f254e5be8e7dd4bccf602648eea53295_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f254e5be8e7dd4bccf602648eea53295_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f254e5be8e7dd4bccf602648eea53295_JaffaCakes118.exe
-
Size
5.8MB
-
MD5
f254e5be8e7dd4bccf602648eea53295
-
SHA1
7aac3880436eb6e1668630bba480d1943ad3e4a1
-
SHA256
43a4364f8ce930a1d8f55bf226a18251863e15f67ac1d85e7eef20d95e11fc7c
-
SHA512
0c74185622ca8d6a43107a0284f73e44cd5d21aa296f0c3ad1c95fb6e55ac0a00420ca8ccb2a1cc89447485887abcec6cccb24aa2bfd1befdeda5ac572538f80
-
SSDEEP
98304:EOAGCKb28pfHUJ4+ho4a7vFM8Fa4KRkNVEbR/JYll3FArv+ByaOHqe8mX:LAGC8VmC+hnTl49EbN0MrA40m
Malware Config
Extracted
pandastealer
1.11
http://f0564653.xsph.ru
Signatures
-
Panda Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/2820-0-0x0000000000890000-0x0000000001257000-memory.dmp family_pandastealer behavioral2/memory/2820-4-0x0000000000890000-0x0000000001257000-memory.dmp family_pandastealer behavioral2/memory/2820-41-0x0000000000890000-0x0000000001257000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2820-0-0x0000000000890000-0x0000000001257000-memory.dmp vmprotect behavioral2/memory/2820-4-0x0000000000890000-0x0000000001257000-memory.dmp vmprotect behavioral2/memory/2820-41-0x0000000000890000-0x0000000001257000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2820 f254e5be8e7dd4bccf602648eea53295_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2820 f254e5be8e7dd4bccf602648eea53295_JaffaCakes118.exe 2820 f254e5be8e7dd4bccf602648eea53295_JaffaCakes118.exe 2820 f254e5be8e7dd4bccf602648eea53295_JaffaCakes118.exe 2820 f254e5be8e7dd4bccf602648eea53295_JaffaCakes118.exe