Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 06:10
Behavioral task
behavioral1
Sample
be088f9cb37894571ffabe46e800b085_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
General
-
Target
be088f9cb37894571ffabe46e800b085_JaffaCakes118.exe
-
Size
14KB
-
MD5
be088f9cb37894571ffabe46e800b085
-
SHA1
a6cced4ece759fc31c641c08170e195a25c356ae
-
SHA256
aa9976401edd918f45dd444db8bab87e26ec05678f0ff49a1b15c51695238ac0
-
SHA512
257ade2f3f03ad27cdfd8e6cf7085d8ab3151f08fee487e22ecdc7f691b861f1dd204bbc04556917a7e6e064187a6336ff1bd10c290093996231bc34f7eb1f02
-
SSDEEP
384:TpmJRTSf71qz1SdZd5z2/0/R0YEcP7DML7hXnESb:1mJRTSf71qz1SdZd5ie0s6l
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
123456seven
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 icanhazip.com 5 icanhazip.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be088f9cb37894571ffabe46e800b085_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2076 be088f9cb37894571ffabe46e800b085_JaffaCakes118.exe