General
-
Target
263a5b039dfd0c0e0394ffdfeb5ea34f_JaffaCakes118
-
Size
852KB
-
Sample
241008-141x7sscnr
-
MD5
263a5b039dfd0c0e0394ffdfeb5ea34f
-
SHA1
b4abd67bc61ded4f142c0a8b64d69cce8e7c8988
-
SHA256
ae0f9096afd3723c22aed5d4385b1d2d86d3ccfbdcfcb7fb8ae4e97339eaf0c0
-
SHA512
4ebd81fb7906c27bb9b4e6436e76d8ea609d66d8d78eee26145b20d5c1bade7c3816a4fb3c7a8d85cb106ec61acd4b3ff65132146ed48430979e9903317d76b6
-
SSDEEP
24576:OrEEdQc9PH7XeERcOvjVyWTppvLU0jsiXDYHT:BEdn/7Xegj42TDiT
Static task
static1
Behavioral task
behavioral1
Sample
263a5b039dfd0c0e0394ffdfeb5ea34f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
263a5b039dfd0c0e0394ffdfeb5ea34f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
263a5b039dfd0c0e0394ffdfeb5ea34f_JaffaCakes118
-
Size
852KB
-
MD5
263a5b039dfd0c0e0394ffdfeb5ea34f
-
SHA1
b4abd67bc61ded4f142c0a8b64d69cce8e7c8988
-
SHA256
ae0f9096afd3723c22aed5d4385b1d2d86d3ccfbdcfcb7fb8ae4e97339eaf0c0
-
SHA512
4ebd81fb7906c27bb9b4e6436e76d8ea609d66d8d78eee26145b20d5c1bade7c3816a4fb3c7a8d85cb106ec61acd4b3ff65132146ed48430979e9903317d76b6
-
SSDEEP
24576:OrEEdQc9PH7XeERcOvjVyWTppvLU0jsiXDYHT:BEdn/7Xegj42TDiT
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1