General
-
Target
7e32a3349de8ff0b55924eb490c80185_JaffaCakes118
-
Size
1.0MB
-
Sample
241030-g8bz4aybpm
-
MD5
7e32a3349de8ff0b55924eb490c80185
-
SHA1
b5deb806bfc4231548491d2dede88be9fc2c0b6b
-
SHA256
f4489bdb9e046c8ad572f90ef272f25305ceb36a84a7507fa1dd4e4aca90a564
-
SHA512
bb7282474f1777fd4341d458f76930881756ed9f9acc29de864286038e9d00acce28365a7845369524558f73829b38ba4fd7c736a1d0f71ec506aaa71d0059ba
-
SSDEEP
24576:/AiNLEMb/abVoxBjKB6ukcWBE4FvHdU8ylbK/r/:/AB0yYBe6ukDEEvHXylG/r/
Behavioral task
behavioral1
Sample
Confirmation.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Confirmation.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Confirmation.exe
-
Size
1.0MB
-
MD5
c1770203c545b2bcfe82cb117b398a5f
-
SHA1
4dc20a479217c8f93764e46a4475bda162b3e4ba
-
SHA256
e0febedda6f3a66c50558d4ed1fc267fc2dcfcb1f828ea30793ad5189df5e093
-
SHA512
e93b2c552a3b423f6d06136ccef9aee2b66fefb24424049996c193cb157d1a204ca11555be5fb8450d915ea4ae0c7c96ccd8c98a9e9fe5c56d9369ff396d02df
-
SSDEEP
24576:O3msSKhttyzWFKhIX6QKyerEGP/imH9rtqTWpvHLXo2:ezFht7pKTpEkZdrta2D1
-
Hawkeye family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1