Analysis
-
max time kernel
129s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2024 22:16
Behavioral task
behavioral1
Sample
45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
45ab445f996969fefe0e530ec2827515
-
SHA1
6b0b2be8348c381051c54a5d3bdecd2d44d1abf2
-
SHA256
6d8b3a1bf9dcc6fcd92a2388fb8e2dde25de097b50c4bbeff7a9e579c23bfc61
-
SHA512
900d183f4491ed0e7c8c275226ecf64a25b3b0d44e7a71189a7a28ae6b1ae87bd7ea7e1eb4b2e6ecde3db5210a586632835d3adcd29e4e15679d181bdf92749b
-
SSDEEP
24576:VqBk70TrcXkF3EPDA5AtiKhhUF54clNf7+6uHAW92zt/sWu2BSMCqDoRg:ykQTA06PD7o54clgLH+tkWJ0NG
Malware Config
Signatures
-
Detects Echelon Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1652-0-0x00000000004D0000-0x0000000000656000-memory.dmp family_echelon -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 api.ipify.org 2 api.ipify.org 25 ip-api.com -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
45ab445f996969fefe0e530ec2827515_JaffaCakes118.exepid process 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
45ab445f996969fefe0e530ec2827515_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1652 45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\45ab445f996969fefe0e530ec2827515_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4112 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD54c2e2189b87f507edc2e72d7d55583a0
SHA11f06e340f76d41ea0d1e8560acd380a901b2a5bd
SHA25699a5f8dea08b5cf512ed888b3e533cc77c08dc644078793dc870abd8828c1bca
SHA5128b6b49e55afe8a697aaf71d975fab9e906143339827f75a57876a540d0d7b9e3cbbcdd8b5435d6198900a73895cc52d2082e66ee8cec342e72f2e427dde71600
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
128KB
MD5a7a11fc665d73f1f784f1226be518de4
SHA1e378f2b67c1379d14fb1131efac04c2f1bdcf900
SHA256ab0c17cc5f59a6f75c1148cac5157b6128ee6ffb321a7857e48ed357fb13b965
SHA5121a45c011d126310a94190f9e7ec6a2c5c2bd6fe501e525834646f196cf05700546ba6398d4ca20002036c0ad0111337ae9315d49cd75ecf51986d57ffbcbc48c
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
288KB
MD50412d4f1fbbc8a52195c0dd0c4526eb5
SHA18e3c27b0d10adf47213956a1b53a30488017a948
SHA256e3e09a94b9254c4f8f1b0d17f07b14a4e3df56eb70f32b2ed72673c72430e190
SHA512957faf91c2fcb46f7503e1046f45707a678d0b6eb15ad045f93030a0694eea79081e37e440a2e704ec1cc6cd946d6d3b7e4e897914d133fe551d7cfe42df88a6
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Browsers\Passwords\Passwords_Edge.txt
Filesize256B
MD59c7de2d8d314259446c889c45bc6fae9
SHA1cb5209ccdab75ebf2c82985699fd51c1afadc372
SHA256e790fc324f53f1979a39d8c555e7e6d38aeb4ef3e1c4a841711055d778185871
SHA512271eea224472a7202bbbf5144a63f59faf708815097376cb1adb88bb8eb611c2c94f631fa9a757153475bfd95a888a1952098c15d8c46311a1d3f66e29025c03
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Browsers\Passwords\Passwords_Edge.txt
Filesize1KB
MD56ca856c7d40e1edc69008e9f4f7a7ba2
SHA162b795c02b6b02e313c15e1c369991f08814a95c
SHA256a8cdd831224a169d08a48633ace3675d98a243ccff849a85ebd1e95a76d04242
SHA5126423bb1e45a8277b2c3ee1cb21324a8abca3735efcf8e45d1aa27e597230e37f01999a3229eb98ff2d42e68de17bf1f093546f5d7e89f246fecdb4b04e9d1db7
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Browsers\Passwords\Passwords_Edge.txt
Filesize1KB
MD5e21da2b922a86aa441a087588d8ba063
SHA1eae0e83300e2fd672a5b75989f9934658aafc42e
SHA25680a07a4e8531475b3819d1a9611b8bdb0205702bb6c7f96729cbc4b9ee496758
SHA512e3131a211c6e5ec2ccafb0378fabeed48156b5e8df2d6ecb0b7dbfa47a7ca35244114ff788e72b8e6950be9bd3ed1fdcc4863b18af8d3103449e07abdd039343
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Browsers\Passwords\Passwords_Edge.txt
Filesize2KB
MD588fe72ee318201e46a1fc7f58fc5a0f7
SHA1799df8bb300d508996d900212edad6170a9bd2bf
SHA256d62a3f605afb8ed80e349f488425d6fb576b9acbf0c8afac0cc341bbc7096912
SHA5121ae6ca9d5e0295124618832910a062ddc85d3565dda03b1886bd0dcc483c861b21de7605713ed27813c15b9ffa4e0757c46d77a15c21a81cf41099e820294a9d
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Browsers\Passwords\Passwords_Edge.txt
Filesize2KB
MD5656726952302f87aa14938d0db9ee454
SHA1a7218b06ef1170e77be390b33877b38519f19e28
SHA25651664925b2e581d6a27d81a84273aaa8a1dbb6572956a5455bc73e1868ba6e8b
SHA512101e39b11d24bbca94f815458c9c2296b724a9104cea9070c143216a69514b51aecb98d97be8899d4e0c925d7749557d9cfe61e35250dd8004a8154b538fd5c7
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Browsers\Passwords\Passwords_Edge.txt
Filesize2KB
MD581b99703a3960d307cd3ab62339c6d2e
SHA178a2f3bc7bb88f881a2511cc2de8221c48f81a23
SHA2562ca6e84f6978690a4fbe9f8afb9c8906362e17dfec9da01861ed44ac3df4832d
SHA51233182c99d24f276968c8c85686593b71efdfca475e630864f5399895d83aa1d320b0de7866c1cce2231d02b80cce641e71763d28535ed05e90b9b0ad70eb478d
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Browsers\Passwords\Passwords_Edge.txt
Filesize3KB
MD5e181e9fc3087583b84164406113f6321
SHA17244c18a52b2c74fa39b7104e779f304b9ae4c12
SHA2566661f2827c61623c6e7ab76fc8c79eb9dc4289e564b781d1f573fbf6f1a2f880
SHA5120686425870c1faec44ab2becaff21a17aaf9ff89bf7d6ad7e41cc2ff0cf3e9f9c17028c614b4982a61e5adccb9cbed99a8edb57f85d962bcaa62858eb55c8249
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Browsers\Passwords\Passwords_Edge.txt
Filesize3KB
MD578dd6580ce6665dd6d6c2f0c244463f8
SHA167cac6c403c3f17e1c0722fb0c2eb250fd8241d8
SHA256ce4f8a9c0b97185ba35cffcf896ffb5076a0b82a13d250b25c452104583a277f
SHA51231e53c2f36069f2491f2fa435e147abfa64467f495e99f5818f000a9c73c99600fba4cab10fc1e9a7ea1b866ab519a26d8444325c0db738952d5e42a929c4b39
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Browsers\Passwords\Passwords_Edge.txt
Filesize426B
MD542fa959509b3ed7c94c0cf3728b03f6d
SHA1661292176640beb0b38dc9e7a462518eb592d27d
SHA256870ef3d2370932a8938faa60abd47d75ea0af98bfa11c82ae8efe9e94fd8be00
SHA5127def291737d081c93d0cc38ac8d3062fd34d93b68d191eb0d54e9857e0c0afdbcd241471a2e10c28ce8db3b1d1ae0dba2ef6f609cfe8a1e8fe1dd103dba80007
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Browsers\Passwords\Passwords_Edge.txt
Filesize4KB
MD5266b750ff315185a8866f8a186995b76
SHA1df45b2f0e9a4647cc74b90e7a13bc613c49fa93a
SHA256cc40de1552dab9ec217ede32da2c13a8afcf4ad8e440143a0028099035586dd2
SHA5123a7e7e9d664c02b65998cfb489a24d403e20593ce5f84484dec2e56d76a759ba8403e1671f0a6460388c268387978916cc4dfb3a5a2e47d2b0a6ed17a7014645
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Browsers\Passwords\Passwords_Edge.txt
Filesize852B
MD5f6112b3498179e945ef8ca979e810858
SHA178411bf22b09f0243f0c4405970b292e8f391f41
SHA25672b2b8ebdc6ebf268b47939e38ff5c6439d458b1149af61b69103de2a0f3feb0
SHA5121ab7bd43b6a62c79336d907e2ec6337f61b20bfdd4b184ff4d3838a84097353c8d7bf21a3e9751b1a7e1af0fae704c39aed1c683bbc1b9151351e246e91ac604
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Computer.txt
Filesize305B
MD5266d15acb349cd5213c897b54d0239fb
SHA1247bf018647b4885c5fef51dc1a8de1a76b84ef3
SHA256818676c58291d22b9bfc907f70bb42c7b01e449499e885c8d9e9abf650b9acd1
SHA51215c4b7bf5ec5d121e29e2361f57ef96570ee3dd948819d55fd666f77ffe8fea75596f6d21cdb2cc9e225e493bb8ba582ebdf2ca0970b71de0fa9fcb89548ad3f
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Grabber\ExitConvertFrom.doc
Filesize408KB
MD5a3f08cfd6cacc94e4bc5d390deb99116
SHA16ee1aed96f65a1dea10443f87915854995d8ee0c
SHA25612247cb34209df36b80138a1e6c0c48a70eb748a16801d3a06f437a1016d0e43
SHA51265df0c6807f901df8d39e05bd6e402ae4263440835b66618df9922bf31f95a4659fa852d2a3b4b897135ac358b10c3ae5e92c6f1b6a7f7afa5fdde9a8fc0d4e6
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Grabber\MoveResize.doc
Filesize255KB
MD57f2ec1b6cb3be79f1894d1e3c47ad2a2
SHA10a6d71efdbaf6e56d342107b74d8d0505c8ecf90
SHA256b819615a2b05843c6e17e2dea17ae4707e6e7c31cdb9b6ffa986a0ddb9bae2d3
SHA5125691f022e928f3f3bee5e99fefba503d0bbb9fe96b827f30da704677161dbea41014d7e610025660c275f2306ad99d00aebb831c4d9c0dfb02cdfb9a38495b6f
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Grabber\ResolveMove.zip
Filesize328KB
MD5066c0ef7dd1a80b3b26fe3d3a92e68db
SHA1eebe5945dca22080d6a0418529354d2efc718a79
SHA256981cada2156762c51f1cb832c419775eb68004151a7fae6c6bdfd8c154db37ea
SHA512bd56fdf8abd826efc14b312a38436c1d19aa51cc82d22f69e454ade1ef124a51ae20fdd8a594645dc029fd2afe5f981c506e921aa4f4636248bf1de283ab8615
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Processes.txt
Filesize904B
MD525f30e9a59c7f343b6f71e94d3f37cf1
SHA1a00c04b48331b6c056efa2aa3ee8851fd55fff76
SHA25641440f05f77221489997d2a9ff5adc252e63f49871f07b939d2e85d4d06489cd
SHA51277da0a0784b2672027ba5f7a7b128e0911f662dc8df431cd8cfbf41495e75f9e92f94ca624b90e9f793bcbdc69ad1ebdacc663491894b7e994fef8a8556c690e
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Processes.txt
Filesize1009B
MD5fb0b5ae55b2e740c2c12d3b97421635c
SHA1799bc287100957c2d0e0c0de6ca580f85b1a95fa
SHA2560e19a6a70e6fdd0c50705c3276bab468f2427c126b449d00e8f7a3c99baa864b
SHA51257a68727eb183e8ededc1a829d6f994ff1f2a66379549073ca2d295c53dd03a4988192049ecec046c37da5e2b6f264405a770b82a15bae79f19d9f289f357b62
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Processes.txt
Filesize947B
MD5f363f4b45ebf407dc94d11c89082abf2
SHA1bab40c3d99f9f383e18606b39a3017ad9a0689cc
SHA256866b6cadbe5e1c0419b9e2bfbc36728e9d07891cf832ca0e3acb5056a03c507f
SHA512f13cebb4c092b2dc12faae8fed1dbdeaca33e2b2f459f18c362b0828c7a65264d741fda83ad2f696563655e58d87ce007cf70cd2d7ca2173cf2f856685cbb502
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Processes.txt
Filesize913B
MD50107086374468265649cc12d41565907
SHA1cbdbe798933fa9064abe237b3c0ecb30b7b53bb0
SHA2563cd127d9b19a38292ff1924835112701df237622e8f06f51ff344e67e79b362f
SHA5129c5c4b84fac450ee4fd98784ca1a0796cd9c32a010ab2f41eb54bdb2b946b108075960167252c5a7918926e72f15b408e4a77e0c5187529a5bde496ba730fde5
-
C:\Users\Admin\AppData\Local\yDRwBVuLXyDuLyJBNHTX078BFBFF000306D2A4B55DEC79\79078BFBFF000306D2A4B55DECyDRwBVuLXyDuLyJBNHTX\Screenshot.Jpeg
Filesize79KB
MD57a052c880b30159beb35befc7f0c68e8
SHA1a7faf08a834c41578a0c245b7daea7f256aa594d
SHA2561841bf218c3264129f9d3a185819d7d7000e8fef1ff1729d147243e240a65eb0
SHA5126c5c3dce0f5829cf7f7cb3e9601baf6a1c43cdd36e08b3236e0ddfa444c69bbf36be527d73eb0466c4f9cb9da4fcd712aceffa47af430b2f41a454dad26473e4