General
-
Target
f39c9a2e23e3f3119efe4698d26b9f53_JaffaCakes118
-
Size
140KB
-
Sample
240924-pck7wsthqm
-
MD5
f39c9a2e23e3f3119efe4698d26b9f53
-
SHA1
def8046d2bd2da6a2d40061454400d6ce5c5d4af
-
SHA256
a2228653372c172284e73ccc2ea18b4634eae8a9c352a2fca22c33131bbf8618
-
SHA512
8ffe5de645e4357139fb1987b31c04542c646442212ad80d090bd20155c35008c9e847e83072a164f5ca1481881f4a36ff651eb35d3716e519ee608cbcdceae5
-
SSDEEP
1536:xxwQevvSjfQ2QOE/baP/8bUxwYgv16oxgyKELV5ANMz/9NEjT8NjOO8k:PiYOBTanXgvvKELVBYjT8z8k
Static task
static1
Behavioral task
behavioral1
Sample
f39c9a2e23e3f3119efe4698d26b9f53_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f39c9a2e23e3f3119efe4698d26b9f53_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
f39c9a2e23e3f3119efe4698d26b9f53_JaffaCakes118
-
Size
140KB
-
MD5
f39c9a2e23e3f3119efe4698d26b9f53
-
SHA1
def8046d2bd2da6a2d40061454400d6ce5c5d4af
-
SHA256
a2228653372c172284e73ccc2ea18b4634eae8a9c352a2fca22c33131bbf8618
-
SHA512
8ffe5de645e4357139fb1987b31c04542c646442212ad80d090bd20155c35008c9e847e83072a164f5ca1481881f4a36ff651eb35d3716e519ee608cbcdceae5
-
SSDEEP
1536:xxwQevvSjfQ2QOE/baP/8bUxwYgv16oxgyKELV5ANMz/9NEjT8NjOO8k:PiYOBTanXgvvKELVBYjT8z8k
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2