General
-
Target
cb7e0d4bf541ed65c8dde7f3cbc50859_JaffaCakes118
-
Size
756KB
-
Sample
240830-xz1j4a1and
-
MD5
cb7e0d4bf541ed65c8dde7f3cbc50859
-
SHA1
31395bcc1e65b94941043bb67c0ce547b39b502d
-
SHA256
5304e6da1ccd4a9dd899b87427d0d2e7bd51aee364cb79bb30774d0eb262b24a
-
SHA512
e106105cf4b0138e8337adb73060a4ec3399488881f568f129b29d73bde512721dc46ccb53d3346be59394326160e1a8628708b19a0ebeb7e89aa0f5a597f693
-
SSDEEP
12288:gVQtqB5urTIoYWBQk1E+VF9mOx9qVIEcG+4djJSHcHySiNnF:gVQtqBorTlYWBhE+V3mOCCZQ8cHyJnF
Static task
static1
Behavioral task
behavioral1
Sample
cb7e0d4bf541ed65c8dde7f3cbc50859_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cb7e0d4bf541ed65c8dde7f3cbc50859_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
Papathegoat
Targets
-
-
Target
cb7e0d4bf541ed65c8dde7f3cbc50859_JaffaCakes118
-
Size
756KB
-
MD5
cb7e0d4bf541ed65c8dde7f3cbc50859
-
SHA1
31395bcc1e65b94941043bb67c0ce547b39b502d
-
SHA256
5304e6da1ccd4a9dd899b87427d0d2e7bd51aee364cb79bb30774d0eb262b24a
-
SHA512
e106105cf4b0138e8337adb73060a4ec3399488881f568f129b29d73bde512721dc46ccb53d3346be59394326160e1a8628708b19a0ebeb7e89aa0f5a597f693
-
SSDEEP
12288:gVQtqB5urTIoYWBQk1E+VF9mOx9qVIEcG+4djJSHcHySiNnF:gVQtqBorTlYWBhE+V3mOCCZQ8cHyJnF
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-