Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 00:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
138610cf962ab62eb32d222a4a35b93a_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
138610cf962ab62eb32d222a4a35b93a_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
138610cf962ab62eb32d222a4a35b93a
-
SHA1
7348ff4e3894610a51e7d87a10500455f535c7e3
-
SHA256
b1209191392de48946828e01f2c44c1fb38c09c89425327b29fdcfb1c4dfa566
-
SHA512
c17f4235964de9de8333e21f10c47d7b36df15ea980b39b7e659d762b18a083fb62964a53cb9ed92cec3c2da71b09a66a2d4a2d11a77b93e15278f569fa1ee69
-
SSDEEP
49152:HQwudv0Z+VSX+DYS7jOtIE3Ft4mZtrWiU/mg6Yqs:ww+Icmmp7jOtIEVtBvPIgs
Malware Config
Extracted
Family
ffdroider
C2
http://186.2.171.3
Signatures
-
FFDroider payload 2 IoCs
resource yara_rule behavioral1/memory/2372-20-0x0000000000400000-0x0000000000991000-memory.dmp family_ffdroider behavioral1/memory/2372-40-0x0000000000400000-0x0000000000991000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2372 138610cf962ab62eb32d222a4a35b93a_JaffaCakes118.exe