General
-
Target
ad21f1628a62e42ed6573a922c72e912_JaffaCakes118
-
Size
986KB
-
Sample
240615-gzpjts1bla
-
MD5
ad21f1628a62e42ed6573a922c72e912
-
SHA1
96113611e8a70b441af6422129edf164b0e5705c
-
SHA256
8394de2db5855735e9cf76e77a3cdcbb596ddb44ddc4a7e86f5388080b9e0b4c
-
SHA512
73c7f4a1afda419f87541fea9e9f9448164cdf724b5c7e5150bdf1346a3177699028aa9e75b4f187719a247c2ba1713bf7aedf2f2e7a9b9eb0acb1fedd1b3af8
-
SSDEEP
24576:Bc5JGM2ny0Adyc1Cb8PTJecYjUyzC66e:5fyRdycNrscY3
Static task
static1
Behavioral task
behavioral1
Sample
ad21f1628a62e42ed6573a922c72e912_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad21f1628a62e42ed6573a922c72e912_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
ad21f1628a62e42ed6573a922c72e912_JaffaCakes118
-
Size
986KB
-
MD5
ad21f1628a62e42ed6573a922c72e912
-
SHA1
96113611e8a70b441af6422129edf164b0e5705c
-
SHA256
8394de2db5855735e9cf76e77a3cdcbb596ddb44ddc4a7e86f5388080b9e0b4c
-
SHA512
73c7f4a1afda419f87541fea9e9f9448164cdf724b5c7e5150bdf1346a3177699028aa9e75b4f187719a247c2ba1713bf7aedf2f2e7a9b9eb0acb1fedd1b3af8
-
SSDEEP
24576:Bc5JGM2ny0Adyc1Cb8PTJecYjUyzC66e:5fyRdycNrscY3
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-