Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 07:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ecd7365422db60cf4f55f3c6f4ed49bf_JaffaCakes118.exe
Resource
win7-20240220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
ecd7365422db60cf4f55f3c6f4ed49bf_JaffaCakes118.exe
-
Size
973KB
-
MD5
ecd7365422db60cf4f55f3c6f4ed49bf
-
SHA1
e4b914e366e854fc076b0faa955d4f52ae6f840d
-
SHA256
77041a33e4f52b86a78b12d80a21e48ba25e4d4c430090f33ba69a08f12a83a7
-
SHA512
a6a3b539765c31957564ee166dd8f2539ff4cfb73e76eda3cae1120f15abea410cc735bd8b0e759d69971ed788e58191b8d1c6f18081236aa7a431c8f88b0a24
-
SSDEEP
24576:UvEEKKedD+iC1ZE3vx/cR/Iqc73+SK+ukOd:+UK2D+DQgI3c3F
Malware Config
Signatures
-
FFDroider payload 2 IoCs
resource yara_rule behavioral1/memory/2468-20-0x0000000000400000-0x0000000000661000-memory.dmp family_ffdroider behavioral1/memory/2468-40-0x0000000000400000-0x0000000000661000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2468 ecd7365422db60cf4f55f3c6f4ed49bf_JaffaCakes118.exe