General
-
Target
f97dcc1d1a01b072051b0e5c7c35b222_JaffaCakes118
-
Size
344KB
-
Sample
240927-b88q6sygpj
-
MD5
f97dcc1d1a01b072051b0e5c7c35b222
-
SHA1
8dfe3aed3315d58c1be2b40b6210245985c1f660
-
SHA256
3deaae34fd6f0a22fe551022c36f6e099ebe23d4605f016299e64c140bfb1d47
-
SHA512
1b8824d3133b15f149059700f9160374494bf0f4ce4886160e6d014638d2a134cebd9bc281e7e2c5e3f567cc68e448f6735a06600c7974d6058877dd0bebd28a
-
SSDEEP
6144:Cduhp8wcIhNHKJ/zSUE4iCJz9iKKiG1KEg3QX7vebSgGweJ5YY35BzaJrLkaG66e:Cduf8wceeSUzkKKiGe3kmS1TJjrzaJ+g
Static task
static1
Behavioral task
behavioral1
Sample
f97dcc1d1a01b072051b0e5c7c35b222_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f97dcc1d1a01b072051b0e5c7c35b222_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
f97dcc1d1a01b072051b0e5c7c35b222_JaffaCakes118
-
Size
344KB
-
MD5
f97dcc1d1a01b072051b0e5c7c35b222
-
SHA1
8dfe3aed3315d58c1be2b40b6210245985c1f660
-
SHA256
3deaae34fd6f0a22fe551022c36f6e099ebe23d4605f016299e64c140bfb1d47
-
SHA512
1b8824d3133b15f149059700f9160374494bf0f4ce4886160e6d014638d2a134cebd9bc281e7e2c5e3f567cc68e448f6735a06600c7974d6058877dd0bebd28a
-
SSDEEP
6144:Cduhp8wcIhNHKJ/zSUE4iCJz9iKKiG1KEg3QX7vebSgGweJ5YY35BzaJrLkaG66e:Cduf8wceeSUzkKKiGe3kmS1TJjrzaJ+g
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2