General
-
Target
02d2b9ea4dcac72e5e3c01b97789dd00_JaffaCakes118
-
Size
135KB
-
Sample
240930-xmpl3azhjk
-
MD5
02d2b9ea4dcac72e5e3c01b97789dd00
-
SHA1
e4a30a5a07f6438d10d647a5300962d52b120340
-
SHA256
dcdaa21b9078022adc255f69b4f45bccc05e2b1a636dac5302b9593cfd5a937f
-
SHA512
bec51f0c65eb2d7adbba8cc71d834989de31c9e51e23a963f88438014b0b1e5801dcf9a4be4bcd712c13c4a15dd1281078ff3ce5e8039d97a01bd184ec9c76d1
-
SSDEEP
1536:DwNXTx1wr/FsfyNDLPWElv9ybWyaL+W5HUYkBSy8JjEQS1CkjtEBeUS79Aj7:UNXTTLGKE19ybfaL+WeB2jePkSE
Static task
static1
Behavioral task
behavioral1
Sample
02d2b9ea4dcac72e5e3c01b97789dd00_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02d2b9ea4dcac72e5e3c01b97789dd00_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://googleapis.com/gate.php
http://catch-cdn.com/gate.php
http://fbstatic-a.akamaihd.net/gate.php
http://l.yimg.com/gate.php
http://simple-cdn-node.com/gate.php
http://nym1.ib.adnxs.com/gate.php
http://cloud13.browser.ovi.com/gate.php
http://catch-cdn.com/1.exe?c=3
-
payload_url
http://catch-cdn.com/6.exe
Targets
-
-
Target
02d2b9ea4dcac72e5e3c01b97789dd00_JaffaCakes118
-
Size
135KB
-
MD5
02d2b9ea4dcac72e5e3c01b97789dd00
-
SHA1
e4a30a5a07f6438d10d647a5300962d52b120340
-
SHA256
dcdaa21b9078022adc255f69b4f45bccc05e2b1a636dac5302b9593cfd5a937f
-
SHA512
bec51f0c65eb2d7adbba8cc71d834989de31c9e51e23a963f88438014b0b1e5801dcf9a4be4bcd712c13c4a15dd1281078ff3ce5e8039d97a01bd184ec9c76d1
-
SSDEEP
1536:DwNXTx1wr/FsfyNDLPWElv9ybWyaL+W5HUYkBSy8JjEQS1CkjtEBeUS79Aj7:UNXTTLGKE19ybfaL+WeB2jePkSE
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-