Analysis
-
max time kernel
98s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 08:52
Static task
static1
Behavioral task
behavioral1
Sample
bca11b7e7f05b428e5d096fced90b03b_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
bca11b7e7f05b428e5d096fced90b03b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bca11b7e7f05b428e5d096fced90b03b_JaffaCakes118.exe
-
Size
18.7MB
-
MD5
bca11b7e7f05b428e5d096fced90b03b
-
SHA1
b869f828b7d521864de715cb56744ad164babe76
-
SHA256
f53aceec2dd2323f9ef02ba077f140f2c968762bde3e6c19be892ad09697f3cc
-
SHA512
e04b0b0d654f872ac507e49a4b2de8e499b779d1f96d5987ddcd303a135a96a6299c27a2bfafb58d53320138bda3cc07501621e7f60249a0c253764c399cb5d2
-
SSDEEP
393216:ivjySZ/p1nut7F1/huzwzvWFR97axO4HTEQkfF+qMPW08eN1Pki:ivGW1nuJF1ZOqOFR9gOwTUE1PW08ezki
Malware Config
Signatures
-
Panda Stealer payload 21 IoCs
resource yara_rule behavioral2/memory/1940-287-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-292-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-291-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-300-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-298-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-297-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-301-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-305-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-306-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-312-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-313-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-316-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-319-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-317-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-320-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-322-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-323-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-331-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-342-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-332-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer behavioral2/memory/1940-617-0x0000000000400000-0x0000000002CE0000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Pandastealer family
-
Loads dropped DLL 1 IoCs
pid Process 1940 bca11b7e7f05b428e5d096fced90b03b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bca11b7e7f05b428e5d096fced90b03b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1940 bca11b7e7f05b428e5d096fced90b03b_JaffaCakes118.exe 1940 bca11b7e7f05b428e5d096fced90b03b_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD52adaa6733c5cf480d52824b977772dbe
SHA188b4dd86e812c0327e9cc8ea6344af0b91cf6a74
SHA256498aef2e80850094b09578cc54ce0a4a79d8881229c28ba5ab4c888eacb71c71
SHA5120e27bf90bb9f467e94dd8eb76131ae29049de9df8f3070446053d2164d1d7f2b9b41474b27349489e126365e9c34850d9a42c4fad0f63b23ad46f075a8d6d579
-
Filesize
3KB
MD500ce10a19fdfa5b5cfba4f5d8e371683
SHA1f23998163617df6f42a0c3ea730cbbb869cfc410
SHA256046b66aed0f0673433cf4ac68003488245eac2748b402f1f4b062fabc2d34af5
SHA512cfb914f7dc56ba4d8eab964b975211bf8eb7d6a640d28885e7f90438a5cd70a3dc6a2616187c0bdea59a580ff5680dec36239e620a1f0acc4d3ba296267deae1