General
-
Target
1086f0fa892edf0c68e06886eb4226e7_JaffaCakes118
-
Size
65KB
-
Sample
241003-z2xmbsxakn
-
MD5
1086f0fa892edf0c68e06886eb4226e7
-
SHA1
61c0fcd3a6553a97a75ab592ce53baf79e758a8c
-
SHA256
20b0fd3db4c0dbbf50be9f875bf6eca216b4d43eefd17dad55ab6d4c101fde6d
-
SHA512
696611bff07af50635b1de2d8a9c01eadcc8b943c8bc26c7fe6911deff032e35c0607c1eec53cbbb04cafc6e1b746323c05727ca9fdd70d5e18e7ca0dc1ea633
-
SSDEEP
1536:UcbGnFm0Es5jIZwd7mZulETuiy2rUtNuA/MFYBjSSqfL:U19EsVdqnKi7UTuw0UjiL
Static task
static1
Behavioral task
behavioral1
Sample
1086f0fa892edf0c68e06886eb4226e7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1086f0fa892edf0c68e06886eb4226e7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://kioggfa.info:9135/pic/fly.php
http://jmpwjhu.info:9135/pic/fly.php
Targets
-
-
Target
1086f0fa892edf0c68e06886eb4226e7_JaffaCakes118
-
Size
65KB
-
MD5
1086f0fa892edf0c68e06886eb4226e7
-
SHA1
61c0fcd3a6553a97a75ab592ce53baf79e758a8c
-
SHA256
20b0fd3db4c0dbbf50be9f875bf6eca216b4d43eefd17dad55ab6d4c101fde6d
-
SHA512
696611bff07af50635b1de2d8a9c01eadcc8b943c8bc26c7fe6911deff032e35c0607c1eec53cbbb04cafc6e1b746323c05727ca9fdd70d5e18e7ca0dc1ea633
-
SSDEEP
1536:UcbGnFm0Es5jIZwd7mZulETuiy2rUtNuA/MFYBjSSqfL:U19EsVdqnKi7UTuw0UjiL
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories
-
Suspicious use of SetThreadContext
-