General
-
Target
c8b104888f5195155a25c0f10a4680ae_JaffaCakes118
-
Size
928KB
-
Sample
240829-m3twlszdmn
-
MD5
c8b104888f5195155a25c0f10a4680ae
-
SHA1
736222962c56242b83070ef37fbb8e7a6fc0685f
-
SHA256
a7cdf2bb2e20cc4046d6897a2299f3aba3cc6dd99e5e7a06129a9bec8d627bc9
-
SHA512
b07004fff4bb3cab06ed30d034b2ddc1a61f9d29742952fd10090c5c1fe4d4764d07b734497928e3331cf241800beed6f09b818607d28b954da7fdfaf3ec4438
-
SSDEEP
24576:q/hlwX/1brBVGSPBcagNcMJN6aLkkgl2:WlC/E8/gnJwagkg
Static task
static1
Behavioral task
behavioral1
Sample
c8b104888f5195155a25c0f10a4680ae_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c8b104888f5195155a25c0f10a4680ae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
c8b104888f5195155a25c0f10a4680ae_JaffaCakes118
-
Size
928KB
-
MD5
c8b104888f5195155a25c0f10a4680ae
-
SHA1
736222962c56242b83070ef37fbb8e7a6fc0685f
-
SHA256
a7cdf2bb2e20cc4046d6897a2299f3aba3cc6dd99e5e7a06129a9bec8d627bc9
-
SHA512
b07004fff4bb3cab06ed30d034b2ddc1a61f9d29742952fd10090c5c1fe4d4764d07b734497928e3331cf241800beed6f09b818607d28b954da7fdfaf3ec4438
-
SSDEEP
24576:q/hlwX/1brBVGSPBcagNcMJN6aLkkgl2:WlC/E8/gnJwagkg
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-