General
-
Target
07a8a3dfe4e53f65dab43c5077028598_JaffaCakes118
-
Size
480KB
-
Sample
241001-196qmstbpn
-
MD5
07a8a3dfe4e53f65dab43c5077028598
-
SHA1
9af613fa8b8bc6f995f023b69ff8d3bfe2ae0b30
-
SHA256
d58398ecd1091925a638caafa666f471712a6cba1431acbe4b480f577054c6f9
-
SHA512
5131af3fd715e4be7cf4160dd792eee4449405cb8821d8cb1c5be7203ecd94f6087f2acec564de43757f823266ec9ba7e95f2e0751bdeffd513a70c54aaa90cd
-
SSDEEP
12288:xD6anAVrdVutS3wSgc0JACyb1yUhg2SGDWNw4:dPAdNjiACyb1yUh+Gkx
Static task
static1
Behavioral task
behavioral1
Sample
07a8a3dfe4e53f65dab43c5077028598_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07a8a3dfe4e53f65dab43c5077028598_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
07a8a3dfe4e53f65dab43c5077028598_JaffaCakes118
-
Size
480KB
-
MD5
07a8a3dfe4e53f65dab43c5077028598
-
SHA1
9af613fa8b8bc6f995f023b69ff8d3bfe2ae0b30
-
SHA256
d58398ecd1091925a638caafa666f471712a6cba1431acbe4b480f577054c6f9
-
SHA512
5131af3fd715e4be7cf4160dd792eee4449405cb8821d8cb1c5be7203ecd94f6087f2acec564de43757f823266ec9ba7e95f2e0751bdeffd513a70c54aaa90cd
-
SSDEEP
12288:xD6anAVrdVutS3wSgc0JACyb1yUhg2SGDWNw4:dPAdNjiACyb1yUh+Gkx
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2