Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    05-04-2024 14:58

General

  • Target

    d6f3cea8a3dc6d6a9077bd68c8f9fa06_JaffaCakes118.exe

  • Size

    844KB

  • MD5

    d6f3cea8a3dc6d6a9077bd68c8f9fa06

  • SHA1

    9d88822ce30b309cef6cef9a10217fa2488281cd

  • SHA256

    3495d37af88a1170f33e6d87645e80c90b5a6f5a87ceed87498173b720b6a583

  • SHA512

    a1c51b09e9676c9ebbf78deab0cbea493b5f41abf92314fc97448d325573cb91da985f66e9667b94964f5142ac7bb3c4a035feb8af736ea787e0b3b632e15e18

  • SSDEEP

    12288:qN8p9LFWpGt1onBuHKw4rEFQWXDThdPTTQBC0vjuY58GYspGcGQk/wybqelq7tz2:8IMpyojwSEFQMKJFq

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6f3cea8a3dc6d6a9077bd68c8f9fa06_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d6f3cea8a3dc6d6a9077bd68c8f9fa06_JaffaCakes118.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2968

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2968-0-0x0000000001100000-0x00000000011DC000-memory.dmp
    Filesize

    880KB

  • memory/2968-1-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp
    Filesize

    9.9MB

  • memory/2968-2-0x00000000004D0000-0x00000000004D6000-memory.dmp
    Filesize

    24KB

  • memory/2968-3-0x00000000004F0000-0x0000000000570000-memory.dmp
    Filesize

    512KB

  • memory/2968-51-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp
    Filesize

    9.9MB