Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 09:09
Behavioral task
behavioral1
Sample
b45e9e6de21b7fff593975adc8550779_JaffaCakes118.exe
Resource
win7-20240319-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b45e9e6de21b7fff593975adc8550779_JaffaCakes118.exe
-
Size
5.7MB
-
MD5
b45e9e6de21b7fff593975adc8550779
-
SHA1
e333c3797a402b7d4af72db730a85eae21af16a6
-
SHA256
c167e698769aa0f9119ad3bfc1f463120be75cc35fe13522e24e49107bdc2594
-
SHA512
652d6dda82f1467ca417e9ff0bc15b560f68e5a269da1e9ff6b217d266d64d949d191986c3106c2bf7ac991acd73e2b26eeb2e5a0d7b154b737238729ec7292d
-
SSDEEP
98304:i5DUM8pGFeBSycG465AkIV/U0hfZ+wBW+irvQ/qpyr0k+tOYCvOkVCQuYYI+iZ7V:0qpCHDiAn63OYCvOkVCQuI+7NAjtVa/u
Malware Config
Extracted
Family
ffdroider
C2
http://186.2.171.3
Signatures
-
FFDroider payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2052-0-0x0000000000400000-0x00000000009B3000-memory.dmp family_ffdroider behavioral1/memory/2052-36-0x0000000000400000-0x00000000009B3000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b45e9e6de21b7fff593975adc8550779_JaffaCakes118.exedescription pid process Token: SeManageVolumePrivilege 2052 b45e9e6de21b7fff593975adc8550779_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2052-0-0x0000000000400000-0x00000000009B3000-memory.dmpFilesize
5.7MB
-
memory/2052-20-0x00000000031B0000-0x00000000031C0000-memory.dmpFilesize
64KB
-
memory/2052-26-0x0000000003C50000-0x0000000003C60000-memory.dmpFilesize
64KB
-
memory/2052-36-0x0000000000400000-0x00000000009B3000-memory.dmpFilesize
5.7MB