Analysis
-
max time kernel
134s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:44
Behavioral task
behavioral1
Sample
63aa17ae4f307834a491fe583dd40ad2_JaffaCakes118.exe
Resource
win7-20240215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
63aa17ae4f307834a491fe583dd40ad2_JaffaCakes118.exe
-
Size
377KB
-
MD5
63aa17ae4f307834a491fe583dd40ad2
-
SHA1
a491ecee060976a3f92d1f78c01eae395458f8e7
-
SHA256
54a665f2962307c1cdb9f865b60da2d5d5940654c7824818c1c6e76168a6cc9b
-
SHA512
d451c2ea0382641e6b554105df5ac2f6866f017ef0097ddffa2e95787cb199bb0f69aeaa892e99acaf3fdb2b7177c65d27b25d38a7d29c292d799b0fa93f8e59
-
SSDEEP
3072:hO7HQolIrINJ8QV6Zx8oIRHkgIOus0yLhRUu8CntXN7FJL2ziDmybJF:hO7PvDVgxxINhIOuqLxr2ziSQ
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
Maolenerkki2
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 icanhazip.com 5 icanhazip.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
63aa17ae4f307834a491fe583dd40ad2_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2208 63aa17ae4f307834a491fe583dd40ad2_JaffaCakes118.exe