General
-
Target
7774429f80647641d6a6098c15a5d8ba_JaffaCakes118
-
Size
949KB
-
Sample
241028-d29e8sxkcv
-
MD5
7774429f80647641d6a6098c15a5d8ba
-
SHA1
e351ef68b8e654f7f7d12e848ee9b6ae3a68b7af
-
SHA256
b9aff8ccd1c3379f2e5bfb90225d8ea798cee4133b6494564ff864e549caa994
-
SHA512
3fa78364e4f317172c38ac3beccb27b89a05508e960e88dd86ff66db611089a0ef9c21ea10e17dd63cd0fb3f615045b293dc57f54ac79b8eda9be7af4bb96bf3
-
SSDEEP
24576:CiG0/zm8VGENcZvggF5Sdq7/C52tsA/3d:CiG89VLwJCk6Ujd
Static task
static1
Behavioral task
behavioral1
Sample
7774429f80647641d6a6098c15a5d8ba_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7774429f80647641d6a6098c15a5d8ba_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7774429f80647641d6a6098c15a5d8ba_JaffaCakes118
-
Size
949KB
-
MD5
7774429f80647641d6a6098c15a5d8ba
-
SHA1
e351ef68b8e654f7f7d12e848ee9b6ae3a68b7af
-
SHA256
b9aff8ccd1c3379f2e5bfb90225d8ea798cee4133b6494564ff864e549caa994
-
SHA512
3fa78364e4f317172c38ac3beccb27b89a05508e960e88dd86ff66db611089a0ef9c21ea10e17dd63cd0fb3f615045b293dc57f54ac79b8eda9be7af4bb96bf3
-
SSDEEP
24576:CiG0/zm8VGENcZvggF5Sdq7/C52tsA/3d:CiG89VLwJCk6Ujd
-
Hawkeye family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-