Analysis
-
max time kernel
128s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 11:45
Behavioral task
behavioral1
Sample
JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe
-
Size
1.8MB
-
MD5
4003458329d4ffc9c6cc59c517ee61d4
-
SHA1
429db292a18b71b7a64678fd90d72875cd6c65bf
-
SHA256
c5c65f8081ace93fdb27c429951bab9afc3b56c3227c64fedc32049edbfdcadb
-
SHA512
ff1684b6a7f99accd1ef7aac09e83a5b0dc3accc8717bf8a6333b81b45e55c01153102395a88148a2b9ed0f07470d6d8cef072b011061103c6274c1b98d8aef8
-
SSDEEP
49152:KFlk6aIlk6oDD5IgbbMqulscpYmACnYQw/iTVU3vijkDAU5tjY:KFlk6aIlk6IRCYd
Malware Config
Signatures
-
Panda Stealer payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023d1b-12.dat family_pandastealer behavioral2/memory/2936-20-0x0000000000400000-0x0000000000596000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Pandastealer family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe -
Executes dropped EXE 3 IoCs
pid Process 2000 Crypted.exe 2936 CCleaner.exe 2080 Crypted.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Key33 = "C:\\Windows\\system32\\file.exe" JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Key33 = "C:\\Windows\\system32\\file.exe" JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2000 set thread context of 2080 2000 Crypted.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 840 2080 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CCleaner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypted.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3744 wrote to memory of 2000 3744 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 87 PID 3744 wrote to memory of 2000 3744 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 87 PID 3744 wrote to memory of 2000 3744 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 87 PID 3744 wrote to memory of 2936 3744 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 88 PID 3744 wrote to memory of 2936 3744 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 88 PID 3744 wrote to memory of 2936 3744 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 88 PID 2000 wrote to memory of 2080 2000 Crypted.exe 89 PID 2000 wrote to memory of 2080 2000 Crypted.exe 89 PID 2000 wrote to memory of 2080 2000 Crypted.exe 89 PID 2000 wrote to memory of 2080 2000 Crypted.exe 89 PID 2000 wrote to memory of 2080 2000 Crypted.exe 89 PID 2936 wrote to memory of 5064 2936 CCleaner.exe 90 PID 2936 wrote to memory of 5064 2936 CCleaner.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 4204⤵
- Program crash
PID:840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CCleaner.exe"C:\Users\Admin\AppData\Local\Temp\CCleaner.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\system32\pcaui.exe"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {22bfeed6-cb41-4fe3-9e7b-fab443ef9e19} -a "CCleaner" -v "Piriform Ltd" -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 2 -f 2021048 -k 0 -e "C:\Users\Admin\AppData\Local\Temp\CCleaner.exe"3⤵PID:5064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2080 -ip 20801⤵PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD580baa9c95ef5e0eb3da7db06b48023d4
SHA14a717610dba20e0d1668d6b79014b8c9439b4a6e
SHA2564a1724ab0c30ac35aa1f5a3c0212a3e23c906e85879b70722cc320191a3adc64
SHA51201e7f8addd31936977d867f122f76bc5bce64c7658e5fd3b45bb11653573b0e462421fa1b22166b0513aa09b52d031b68a75461c50fa850c0858a0cc829dea5c
-
Filesize
131KB
MD5bea9463dc85408c0087967bbb2588791
SHA160fc8133bf3522aa34321877153d20ce934a7fca
SHA2567daf07ecac4a2a5f64415602e2ff669a6f33eb5e1c33e1c41262958752119504
SHA512e0062e5303cc467cf2b5768803a6b945a716bf69a668d616388532179f56164a612ce7fc5e9519521a1b7d28c0e55e67b83ddd365e555dff6453b6c3b43aa949