General
-
Target
530bcc7e1782ae1c16391d1d3bd38624_JaffaCakes118
-
Size
801KB
-
Sample
241017-wzfz1sybqf
-
MD5
530bcc7e1782ae1c16391d1d3bd38624
-
SHA1
17cbf0e7e8c533d961d7df0bc3062623616203d0
-
SHA256
60bf6dec9b5557afb82f58a4fcbe3c638ff5b8efda3d47f8d385737b01b4104e
-
SHA512
d1ef026547cd855b9f91bc983744eb0cc071780ccf99eaf7967158ea8240937fb763237ce6506169abea6f8aaf82929a1a15f4cf044e925bdaf26a03763638cb
-
SSDEEP
24576:+ucB4wMyBYYWlHbd2omykMrkeAHRCgZEXHiysPSOKd:WB4wMWWlHhPt9AUIEXHiyuSOKd
Static task
static1
Behavioral task
behavioral1
Sample
530bcc7e1782ae1c16391d1d3bd38624_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
530bcc7e1782ae1c16391d1d3bd38624_JaffaCakes118
-
Size
801KB
-
MD5
530bcc7e1782ae1c16391d1d3bd38624
-
SHA1
17cbf0e7e8c533d961d7df0bc3062623616203d0
-
SHA256
60bf6dec9b5557afb82f58a4fcbe3c638ff5b8efda3d47f8d385737b01b4104e
-
SHA512
d1ef026547cd855b9f91bc983744eb0cc071780ccf99eaf7967158ea8240937fb763237ce6506169abea6f8aaf82929a1a15f4cf044e925bdaf26a03763638cb
-
SSDEEP
24576:+ucB4wMyBYYWlHbd2omykMrkeAHRCgZEXHiysPSOKd:WB4wMWWlHhPt9AUIEXHiyuSOKd
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1