General
-
Target
8de4b87458eccfaf55b7eadea6d2a2fa_JaffaCakes118
-
Size
742KB
-
Sample
240602-neebpacb85
-
MD5
8de4b87458eccfaf55b7eadea6d2a2fa
-
SHA1
7696e37037751dfd097c87ee0085e5de016bf98c
-
SHA256
d8288616f75a9b09eb77e18244d7ae7ecb3f250ba5d7ccdedaa9689c016fe5ef
-
SHA512
0ce21b713f9bc40eb4058778c68b9918bbce046093cd9b19575ea5bdb4f6630762d16cd2dcfcc1f289a6378b624f8705dfa24c52f823383da464794d66f3e6b1
-
SSDEEP
12288:AX378cmb6Xc+9jzpbKsll9THSSCWfsV9aFxYMJ5j3nb+:An7vEKcMnpPpSSCWYstN3K
Static task
static1
Behavioral task
behavioral1
Sample
8de4b87458eccfaf55b7eadea6d2a2fa_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8de4b87458eccfaf55b7eadea6d2a2fa_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
Protocol: smtp- Host:
ns7.hadara.ps - Port:
587 - Username:
[email protected] - Password:
qazxswqazxsw@123
Targets
-
-
Target
8de4b87458eccfaf55b7eadea6d2a2fa_JaffaCakes118
-
Size
742KB
-
MD5
8de4b87458eccfaf55b7eadea6d2a2fa
-
SHA1
7696e37037751dfd097c87ee0085e5de016bf98c
-
SHA256
d8288616f75a9b09eb77e18244d7ae7ecb3f250ba5d7ccdedaa9689c016fe5ef
-
SHA512
0ce21b713f9bc40eb4058778c68b9918bbce046093cd9b19575ea5bdb4f6630762d16cd2dcfcc1f289a6378b624f8705dfa24c52f823383da464794d66f3e6b1
-
SSDEEP
12288:AX378cmb6Xc+9jzpbKsll9THSSCWfsV9aFxYMJ5j3nb+:An7vEKcMnpPpSSCWYstN3K
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-