General
-
Target
fa79263dae3ce8cd9f9dea59b255585b_JaffaCakes118
-
Size
716KB
-
Sample
240927-qjqlmathjj
-
MD5
fa79263dae3ce8cd9f9dea59b255585b
-
SHA1
8721508ce16aebcb26b17ea4d69557b73733c08e
-
SHA256
40dbdfae6c4e677b9b0dacbb7aab66832d843db7fe7a5de60a776f0f846a5473
-
SHA512
494a787bab59df97741f719b52ad0872256832fcb26e03e436287176d3a7c73a4fc428a454175c77c2075e9f940240dfbe74d257c89797a74173d70d7829f416
-
SSDEEP
12288:DBML2eIWLVbb5jmEJvFKeyax3+qqy/CPXbnTVl3yuWpaHDWSUx+MS:DB0UWRbbNmIUda5DqyyJHDWo
Static task
static1
Behavioral task
behavioral1
Sample
fa79263dae3ce8cd9f9dea59b255585b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fa79263dae3ce8cd9f9dea59b255585b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
fa79263dae3ce8cd9f9dea59b255585b_JaffaCakes118
-
Size
716KB
-
MD5
fa79263dae3ce8cd9f9dea59b255585b
-
SHA1
8721508ce16aebcb26b17ea4d69557b73733c08e
-
SHA256
40dbdfae6c4e677b9b0dacbb7aab66832d843db7fe7a5de60a776f0f846a5473
-
SHA512
494a787bab59df97741f719b52ad0872256832fcb26e03e436287176d3a7c73a4fc428a454175c77c2075e9f940240dfbe74d257c89797a74173d70d7829f416
-
SSDEEP
12288:DBML2eIWLVbb5jmEJvFKeyax3+qqy/CPXbnTVl3yuWpaHDWSUx+MS:DB0UWRbbNmIUda5DqyyJHDWo
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-