General
-
Target
f71924ce90b3e49a4e586dfcad1cdfa8_JaffaCakes118
-
Size
4.9MB
-
Sample
240418-c8zc6sac2y
-
MD5
f71924ce90b3e49a4e586dfcad1cdfa8
-
SHA1
cff90e897e6d544178c5a3f291118b3544ee8615
-
SHA256
083f2d70fbd1a5f5290660c128124798e94c641fb54a4f2611a9d7edd64a5721
-
SHA512
b588cb26f559ca8586811d132c60048fda6551b90202e5853dbd86820f0e6836ac0b77ba12a051ff435ca4a8d5ab7938cad6104050a3f4ab6be285f642ed6c6f
-
SSDEEP
98304:Bis3mjKl5B3UjHXKJlijcFK4eqsWUGdmHgUOdWopV8BaFn9Cu4FK9zAUjd:f3Vl5VUDKJPUmBUi2aFnMu4K8ud
Static task
static1
Behavioral task
behavioral1
Sample
f71924ce90b3e49a4e586dfcad1cdfa8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f71924ce90b3e49a4e586dfcad1cdfa8_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.qq.com - Port:
587 - Username:
[email protected] - Password:
370782yjm
Targets
-
-
Target
f71924ce90b3e49a4e586dfcad1cdfa8_JaffaCakes118
-
Size
4.9MB
-
MD5
f71924ce90b3e49a4e586dfcad1cdfa8
-
SHA1
cff90e897e6d544178c5a3f291118b3544ee8615
-
SHA256
083f2d70fbd1a5f5290660c128124798e94c641fb54a4f2611a9d7edd64a5721
-
SHA512
b588cb26f559ca8586811d132c60048fda6551b90202e5853dbd86820f0e6836ac0b77ba12a051ff435ca4a8d5ab7938cad6104050a3f4ab6be285f642ed6c6f
-
SSDEEP
98304:Bis3mjKl5B3UjHXKJlijcFK4eqsWUGdmHgUOdWopV8BaFn9Cu4FK9zAUjd:f3Vl5VUDKJPUmBUi2aFnMu4K8ud
-
Modifies WinLogon for persistence
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-