General
-
Target
JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f
-
Size
251KB
-
Sample
250212-h21kjs1qgk
-
MD5
ee3b5472af95b20e0bd143ac09e8413f
-
SHA1
ddfadbafc764c5fca1061afc8f510ec79fce5867
-
SHA256
4a6cc24d3fc5162bd0892f6a15126f7c801f8e5631a8100901ff1b735dae5c6f
-
SHA512
253993cdab6a79e4b3aac98b8ac7879ed188368514aa7a103a82cac3b971968a2f121aa094826a6e28908173113df1884f85523004e03da467d3b32c3fde4bdd
-
SSDEEP
3072:x3tpH5vx16ClhTNAycOUXJ9lwLpTlW6hXWLLFpIB1HlrWVKW5J7f3e:x3rPltNAlOUXJ9lwLpFALPmhW0W372
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
classyu4
Targets
-
-
Target
JaffaCakes118_ee3b5472af95b20e0bd143ac09e8413f
-
Size
251KB
-
MD5
ee3b5472af95b20e0bd143ac09e8413f
-
SHA1
ddfadbafc764c5fca1061afc8f510ec79fce5867
-
SHA256
4a6cc24d3fc5162bd0892f6a15126f7c801f8e5631a8100901ff1b735dae5c6f
-
SHA512
253993cdab6a79e4b3aac98b8ac7879ed188368514aa7a103a82cac3b971968a2f121aa094826a6e28908173113df1884f85523004e03da467d3b32c3fde4bdd
-
SSDEEP
3072:x3tpH5vx16ClhTNAycOUXJ9lwLpTlW6hXWLLFpIB1HlrWVKW5J7f3e:x3rPltNAlOUXJ9lwLpFALPmhW0W372
-
Hawkeye family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4