General
-
Target
c9675564c4208ac7865611eff2e48f11_JaffaCakes118
-
Size
2.2MB
-
Sample
240829-xc7pwswakh
-
MD5
c9675564c4208ac7865611eff2e48f11
-
SHA1
2f9b16299dc1fdd4751915361a4cd6225267d99d
-
SHA256
674b204d76fde06ea2af8d8f61a915229e685c505dadd045868624bb0a791811
-
SHA512
e8a90d87f4ac7d583f1051b0761ef8e931ac4b42ed0f38a517ca304bc86cd9626a9ef3b4ace46e1506b9015937f4ad280111ffd9a9bbf7e08e196d5fed84fe86
-
SSDEEP
24576:hUzebIo7Q3DFuuL1LXEXkX1TzEVhdOPWtslFP+rZSba+fwZoQ+R:hfIoQ3DFuGLXEXkXFzEndJePQMr4Zov
Static task
static1
Behavioral task
behavioral1
Sample
c9675564c4208ac7865611eff2e48f11_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c9675564c4208ac7865611eff2e48f11_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
c9675564c4208ac7865611eff2e48f11_JaffaCakes118
-
Size
2.2MB
-
MD5
c9675564c4208ac7865611eff2e48f11
-
SHA1
2f9b16299dc1fdd4751915361a4cd6225267d99d
-
SHA256
674b204d76fde06ea2af8d8f61a915229e685c505dadd045868624bb0a791811
-
SHA512
e8a90d87f4ac7d583f1051b0761ef8e931ac4b42ed0f38a517ca304bc86cd9626a9ef3b4ace46e1506b9015937f4ad280111ffd9a9bbf7e08e196d5fed84fe86
-
SSDEEP
24576:hUzebIo7Q3DFuuL1LXEXkX1TzEVhdOPWtslFP+rZSba+fwZoQ+R:hfIoQ3DFuGLXEXkXFzEndJePQMr4Zov
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1