Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 03:38

General

  • Target

    e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe

  • Size

    496KB

  • MD5

    e92102456f8f5f07bcd03712b09fd0dd

  • SHA1

    fcadd9925a226bc0ace92195275f06eef28cf322

  • SHA256

    1ca711c55045efac2a5259b1c3f22df939f6cc18dd14fcf1c1cf28cbb8bab75b

  • SHA512

    d4dcc803972917b988bc4f1967b7af0a5473c0a787330a88ad837406807fc0f911a4562c9e47ce68a1a7671a531995293056b7b848b21be332a3b353031f4d3a

  • SSDEEP

    12288:Af4zdi3VemHZziQaGTf8B6/sdrsM66fyl:cVRlf8B68rHy

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    411B

    MD5

    804a6740a58942759032803bc3a43dda

    SHA1

    6c8b9c607c275878286f89613384009955637994

    SHA256

    7f99b300de5884a9a1941f7c0c77d28d67fe941f287690344efa599a1efea45b

    SHA512

    cecb97c3dde4566ae46bcd3c3a99680714a6a1726473f0950a3a1d08d7a5b0c65ba936e461400725726ff76659cd4cad3495f6029f8ce8dc96dcea17bede08a8

  • memory/1612-0-0x00000000013E0000-0x00000000014CA000-memory.dmp

    Filesize

    936KB

  • memory/1612-1-0x000007FEF51F0000-0x000007FEF5BDC000-memory.dmp

    Filesize

    9.9MB

  • memory/1612-2-0x0000000000480000-0x0000000000500000-memory.dmp

    Filesize

    512KB

  • memory/1612-3-0x0000000000480000-0x0000000000500000-memory.dmp

    Filesize

    512KB

  • memory/1612-4-0x0000000000480000-0x0000000000500000-memory.dmp

    Filesize

    512KB

  • memory/1612-50-0x000007FEF51F0000-0x000007FEF5BDC000-memory.dmp

    Filesize

    9.9MB