General
-
Target
d8cbec4b3e65277a3e0d5379eb741ad0_JaffaCakes118
-
Size
2.8MB
-
Sample
240910-w3ftesxhlq
-
MD5
d8cbec4b3e65277a3e0d5379eb741ad0
-
SHA1
5f3d45113f3b204de3501f22f0eae991ed392bb1
-
SHA256
af2cadaaaa720be13535c0409238c6b7b73e256064ce57c3120f58f32aaf2538
-
SHA512
2299a75241d09cd659111ba5d7ccdaf4a92b43ff93684934261bc2120dece89022fbf7d7bfc98a571677156743095ebc4c6955478058a4195e2018c0fe1a7037
-
SSDEEP
49152:/Rivo7pW5BOLro1Zj5ajB0IG6xLfPK7/gnizytn7O+kYvAT4QUD0ldgcu:/yhOLkajB31xTK74Cz+kYc4Q2YKc
Static task
static1
Behavioral task
behavioral1
Sample
d8cbec4b3e65277a3e0d5379eb741ad0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d8cbec4b3e65277a3e0d5379eb741ad0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.gmx.net - Port:
587 - Username:
[email protected] - Password:
yk;2]jNfT"&f=YH'/Q_}
Targets
-
-
Target
d8cbec4b3e65277a3e0d5379eb741ad0_JaffaCakes118
-
Size
2.8MB
-
MD5
d8cbec4b3e65277a3e0d5379eb741ad0
-
SHA1
5f3d45113f3b204de3501f22f0eae991ed392bb1
-
SHA256
af2cadaaaa720be13535c0409238c6b7b73e256064ce57c3120f58f32aaf2538
-
SHA512
2299a75241d09cd659111ba5d7ccdaf4a92b43ff93684934261bc2120dece89022fbf7d7bfc98a571677156743095ebc4c6955478058a4195e2018c0fe1a7037
-
SSDEEP
49152:/Rivo7pW5BOLro1Zj5ajB0IG6xLfPK7/gnizytn7O+kYvAT4QUD0ldgcu:/yhOLkajB31xTK74Cz+kYc4Q2YKc
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-