Analysis
-
max time kernel
135s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 16:28
Behavioral task
behavioral1
Sample
6852c8ae3e77b61203d69e49c2c9d65e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6852c8ae3e77b61203d69e49c2c9d65e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6852c8ae3e77b61203d69e49c2c9d65e_JaffaCakes118.exe
-
Size
6.3MB
-
MD5
6852c8ae3e77b61203d69e49c2c9d65e
-
SHA1
c5cbe1706a54f996e0d6ccb7f6a9415436102195
-
SHA256
f3d4afa8e01e777489254240b5f4fcdfc8b0f6fa8660d03f298483b5a9e5b882
-
SHA512
8fa6734eec0f9e7093ce6d8a602f5c93e5160105774f917484c5cefbc8be1e9ae50ac0d315b58f005b1130cd4bbaa20086f08a3191feaa4d2d5000ca57f3b334
-
SSDEEP
196608:x3AJHcweBt3auN+achZy+L5RMhlo6VAb:xQNcTBpd+achPbKo62
Malware Config
Signatures
-
Panda Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/3532-1-0x00000000006C0000-0x0000000000D1F000-memory.dmp family_pandastealer behavioral2/memory/3532-4-0x00000000006C0000-0x0000000000D1F000-memory.dmp family_pandastealer behavioral2/memory/3532-36-0x00000000006C0000-0x0000000000D1F000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3532-1-0x00000000006C0000-0x0000000000D1F000-memory.dmp vmprotect behavioral2/memory/3532-4-0x00000000006C0000-0x0000000000D1F000-memory.dmp vmprotect behavioral2/memory/3532-36-0x00000000006C0000-0x0000000000D1F000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6852c8ae3e77b61203d69e49c2c9d65e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1144 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3532 6852c8ae3e77b61203d69e49c2c9d65e_JaffaCakes118.exe 3532 6852c8ae3e77b61203d69e49c2c9d65e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3532 wrote to memory of 764 3532 6852c8ae3e77b61203d69e49c2c9d65e_JaffaCakes118.exe 87 PID 3532 wrote to memory of 764 3532 6852c8ae3e77b61203d69e49c2c9d65e_JaffaCakes118.exe 87 PID 3532 wrote to memory of 764 3532 6852c8ae3e77b61203d69e49c2c9d65e_JaffaCakes118.exe 87 PID 764 wrote to memory of 1144 764 cmd.exe 89 PID 764 wrote to memory of 1144 764 cmd.exe 89 PID 764 wrote to memory of 1144 764 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\6852c8ae3e77b61203d69e49c2c9d65e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6852c8ae3e77b61203d69e49c2c9d65e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 5 & Del /f /q "C:\Users\Admin\AppData\Local\Temp\6852c8ae3e77b61203d69e49c2c9d65e_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\timeout.exetimeout /T 53⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1144
-
-