Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 13:45
Behavioral task
behavioral1
Sample
b7dee3fb047ddc65b2b82774970b94cf_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7dee3fb047ddc65b2b82774970b94cf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7dee3fb047ddc65b2b82774970b94cf_JaffaCakes118.exe
-
Size
49KB
-
MD5
b7dee3fb047ddc65b2b82774970b94cf
-
SHA1
a695ae76aef79ad965896d601c22360877b19d8b
-
SHA256
bcb5079d5db91a09fad37fb317a5c3dd4be650f11be2a452f56598a0b7e243db
-
SHA512
925eb56db276d8683ab8c6c894c353dc0f875ad980b5ba324953badafa0fc83c7c9a9866c64e5d9384178395f58edca1e1b42658680e6ca8de6c9d38a9abd919
-
SSDEEP
768:jtTXhYJqbvz0qrSon+vwxCVcimGaMXK1i5XzB1Ncjjntu7CQY/iCeoO1hwt:5aJGYISo+4CVciOMxXzaBu5YXO1hwt
Malware Config
Signatures
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/3856-1-0x0000000000400000-0x000000000041D000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/3856-1-0x0000000000400000-0x000000000041D000-memory.dmp MailPassView -
resource yara_rule behavioral2/memory/3856-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3856-1-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts b7dee3fb047ddc65b2b82774970b94cf_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7dee3fb047ddc65b2b82774970b94cf_JaffaCakes118.exe