General
-
Target
13b470ab4c1dde94867a567d88fdb673_JaffaCakes118
-
Size
646KB
-
Sample
240504-vrvmrscb3y
-
MD5
13b470ab4c1dde94867a567d88fdb673
-
SHA1
ffd3e2e7dc16bbe5d3e5b64ecae040a924cbcdc2
-
SHA256
519391b8556e2eb1920af3d56f40c239319188265e0bdc7585fcaf6ab2bbaecb
-
SHA512
74ddc6aa93a5890762e856d2bb1b74cdf2acf1609edb27b3b790ad3efdbae00104ce5640ebc6b7edae07fe3267b5b4320a4c6bcb1400dc116a07f24b8242b568
-
SSDEEP
12288:u1PyErR7/1fRwhRkZAxk9jwhcyEGrHmvduHcyB8AjbZ+NdNbnFupx5I:sP9wv8Axk9mESHmvdu8SNPZAN
Static task
static1
Behavioral task
behavioral1
Sample
13b470ab4c1dde94867a567d88fdb673_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13b470ab4c1dde94867a567d88fdb673_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
13b470ab4c1dde94867a567d88fdb673_JaffaCakes118
-
Size
646KB
-
MD5
13b470ab4c1dde94867a567d88fdb673
-
SHA1
ffd3e2e7dc16bbe5d3e5b64ecae040a924cbcdc2
-
SHA256
519391b8556e2eb1920af3d56f40c239319188265e0bdc7585fcaf6ab2bbaecb
-
SHA512
74ddc6aa93a5890762e856d2bb1b74cdf2acf1609edb27b3b790ad3efdbae00104ce5640ebc6b7edae07fe3267b5b4320a4c6bcb1400dc116a07f24b8242b568
-
SSDEEP
12288:u1PyErR7/1fRwhRkZAxk9jwhcyEGrHmvduHcyB8AjbZ+NdNbnFupx5I:sP9wv8Axk9mESHmvdu8SNPZAN
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-