Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2024 14:10
Behavioral task
behavioral1
Sample
7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe
Resource
win7-20240319-en
General
-
Target
7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
7330398e4bc7afd3740c804362ec8a99
-
SHA1
02fb96618ba3c6ce8d82b511883fa3d9b99ca935
-
SHA256
17f36f9ac30e7ec160932fb3ef8efcc7ba779a63fe7e2510857a2e6d2909cb32
-
SHA512
812fbf165de8c209b6eeb7e3aff11c1740f30d518329bcc78a472cebaee1e59c2b6c0ef3388aba53bb1901d3318ed9dc726c447a1009f74f98352ff4fedaf322
-
SSDEEP
24576:3Rp2fYlh5hJYrsWSlTeTmvL2aIZX8W6jO2kkYOnbXgwpVg/:hp1v1jC5jNTOnjjp2/
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 iplogger.org 15 iplogger.org -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 788 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeCreateTokenPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeAssignPrimaryTokenPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeLockMemoryPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeMachineAccountPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeTcbPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeSecurityPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeLoadDriverPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeSystemProfilePrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeSystemtimePrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeCreatePermanentPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeBackupPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeRestorePrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeShutdownPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeDebugPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeAuditPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeUndockPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeSyncAgentPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeEnableDelegationPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeManageVolumePrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeImpersonatePrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: 31 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: 32 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: 33 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: 34 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: 35 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe Token: SeDebugPrivilege 788 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4104 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe 95 PID 4468 wrote to memory of 4104 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe 95 PID 4468 wrote to memory of 4104 4468 7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe 95 PID 4104 wrote to memory of 788 4104 cmd.exe 97 PID 4104 wrote to memory of 788 4104 cmd.exe 97 PID 4104 wrote to memory of 788 4104 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7330398e4bc7afd3740c804362ec8a99_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1040 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:4172