Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    29-03-2024 17:21

General

  • Target

    28170eaa9be5bd7a9dcce21b50371db2_JaffaCakes118.exe

  • Size

    531KB

  • MD5

    28170eaa9be5bd7a9dcce21b50371db2

  • SHA1

    4e062ff043374e0fdf403389d0e91e39c0110b1d

  • SHA256

    8d0313c0a31c44f03eb90523a5ffd448e5c78985b31d79af25fdb9e8e56a410b

  • SHA512

    aa82a575ed9c7806c676b2ceb0dca2aae4c67fdbcb21c8c9e9a23ace744b0b4331720547b3445aaf4931f67b6cd249dcb613f5dabef10f31135ec776dec56984

  • SSDEEP

    6144:2VWYGnd1E6dqi4py5I+TyiJd1E6dqi4py58pvrlA1r8+6/I3z/s1F1C5zroISwMd:2gYsEy1DXdEy1tP6/ors1F1KzrVSwM+4

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28170eaa9be5bd7a9dcce21b50371db2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\28170eaa9be5bd7a9dcce21b50371db2_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\905c0769f9a06c95a24ddf945\patcher.exe

    Filesize

    1.0MB

    MD5

    fdde974e2d37a3437d514a97c02ef299

    SHA1

    a9be4208d46f49b2215374f383fbba7cc0e839d2

    SHA256

    f0cc6c126b2493c8632e397cc3cdd2c0631a258c3bed9ff05991403c7f7ee3fb

    SHA512

    24a6beb14e8362a93fcfb0b9ddc551d36d538ed6a5d7f2f964d7742abf8746aeb622359cd2bb3645835c71daaa72444908ea3f3080ffec4e2ee36ba680becb56

  • memory/2040-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB