General
-
Target
137c573dc84f50fc37a93c78c1c7571b_JaffaCakes118
-
Size
122KB
-
Sample
241004-qe5jzswarm
-
MD5
137c573dc84f50fc37a93c78c1c7571b
-
SHA1
8a938a9993505b49a3baa8fc5a9d8ac1a65b85e8
-
SHA256
aa00e6977ffea2039f8e87fd8836a861fe862fc8d74bf2fc0757ca722c689120
-
SHA512
f4e1e62c9d29775b30003fccd86cd5d7033bde2b495db87b2f246dfe75fa3efba1fc94ccec90fe312c89305b030a16ac5a8389b9f9f95ef022ca2f6a5279f962
-
SSDEEP
1536:MtjWHsL2LalqXz3cDYX5tZg98h1Zit9F4d0HjQvN6Dmg7j/ehcrZbdLg14bL8lxf:ALZlqXjc0X5Yh92GQFwBLklD1nRt
Static task
static1
Behavioral task
behavioral1
Sample
137c573dc84f50fc37a93c78c1c7571b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
137c573dc84f50fc37a93c78c1c7571b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://2.cmisdfoundation.com/forum/viewtopic.php
http://2.williams-farm.com/forum/viewtopic.php
-
payload_url
http://vetriautoroma.com/1JFHgp.exe
http://onewaytransportproducts.com/e1Vemf.exe
http://jonwatkins.com/5aN.exe
http://jiva-voda.com/qoRHC.exe
Targets
-
-
Target
137c573dc84f50fc37a93c78c1c7571b_JaffaCakes118
-
Size
122KB
-
MD5
137c573dc84f50fc37a93c78c1c7571b
-
SHA1
8a938a9993505b49a3baa8fc5a9d8ac1a65b85e8
-
SHA256
aa00e6977ffea2039f8e87fd8836a861fe862fc8d74bf2fc0757ca722c689120
-
SHA512
f4e1e62c9d29775b30003fccd86cd5d7033bde2b495db87b2f246dfe75fa3efba1fc94ccec90fe312c89305b030a16ac5a8389b9f9f95ef022ca2f6a5279f962
-
SSDEEP
1536:MtjWHsL2LalqXz3cDYX5tZg98h1Zit9F4d0HjQvN6Dmg7j/ehcrZbdLg14bL8lxf:ALZlqXjc0X5Yh92GQFwBLklD1nRt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-