General
-
Target
de7711ff0df1b36bd31f32f15843905b_JaffaCakes118
-
Size
842KB
-
Sample
240913-tfayjswhqc
-
MD5
de7711ff0df1b36bd31f32f15843905b
-
SHA1
abd7c78b184f42525f0d7b53ba829e8f81bd2134
-
SHA256
25d0c4ef21f49c4794220886919feebccbe942bffc1c36b8430b9b005693ce42
-
SHA512
fa154ea9e1bad8e71434dc4ccef5182fd5eb93880e7fb10ca95da8399edcfcccc52d47cb78c17a0514bf15ca667865030519cf7c3be85b0494e6f9b83bc95428
-
SSDEEP
12288:JuC9eHN8vWHXsYIugb+94LlvTyFLPkZqVQV3309b+Z2x2G4Q4UFfHak3sD8H7:QCQH2TYqtBTfZqVQBY2Gv4UFfHH328b
Static task
static1
Behavioral task
behavioral1
Sample
de7711ff0df1b36bd31f32f15843905b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de7711ff0df1b36bd31f32f15843905b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
de7711ff0df1b36bd31f32f15843905b_JaffaCakes118
-
Size
842KB
-
MD5
de7711ff0df1b36bd31f32f15843905b
-
SHA1
abd7c78b184f42525f0d7b53ba829e8f81bd2134
-
SHA256
25d0c4ef21f49c4794220886919feebccbe942bffc1c36b8430b9b005693ce42
-
SHA512
fa154ea9e1bad8e71434dc4ccef5182fd5eb93880e7fb10ca95da8399edcfcccc52d47cb78c17a0514bf15ca667865030519cf7c3be85b0494e6f9b83bc95428
-
SSDEEP
12288:JuC9eHN8vWHXsYIugb+94LlvTyFLPkZqVQV3309b+Z2x2G4Q4UFfHak3sD8H7:QCQH2TYqtBTfZqVQBY2Gv4UFfHH328b
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1