Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 03:38
Behavioral task
behavioral1
Sample
e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe
-
Size
496KB
-
MD5
e92102456f8f5f07bcd03712b09fd0dd
-
SHA1
fcadd9925a226bc0ace92195275f06eef28cf322
-
SHA256
1ca711c55045efac2a5259b1c3f22df939f6cc18dd14fcf1c1cf28cbb8bab75b
-
SHA512
d4dcc803972917b988bc4f1967b7af0a5473c0a787330a88ad837406807fc0f911a4562c9e47ce68a1a7671a531995293056b7b848b21be332a3b353031f4d3a
-
SSDEEP
12288:Af4zdi3VemHZziQaGTf8B6/sdrsM66fyl:cVRlf8B68rHy
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1612-0-0x00000000013E0000-0x00000000014CA000-memory.dmp vmprotect -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 freegeoip.app 4 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1612 e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe 1612 e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe 1612 e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe 1612 e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1612 e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e92102456f8f5f07bcd03712b09fd0dd_JaffaCakes118.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411B
MD5804a6740a58942759032803bc3a43dda
SHA16c8b9c607c275878286f89613384009955637994
SHA2567f99b300de5884a9a1941f7c0c77d28d67fe941f287690344efa599a1efea45b
SHA512cecb97c3dde4566ae46bcd3c3a99680714a6a1726473f0950a3a1d08d7a5b0c65ba936e461400725726ff76659cd4cad3495f6029f8ce8dc96dcea17bede08a8