Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
f1333e33b3304fbd79dfa7f0bc2c3e51_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f1333e33b3304fbd79dfa7f0bc2c3e51_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f1333e33b3304fbd79dfa7f0bc2c3e51_JaffaCakes118.exe
-
Size
636KB
-
MD5
f1333e33b3304fbd79dfa7f0bc2c3e51
-
SHA1
d065dd32728a83afca4c618a27a3849b59222bb9
-
SHA256
e79692107334b758dd7d2dd0bace8c6b9b5806efc54843eb4b56c575d85fe8c4
-
SHA512
51c1df5a9e827b935f2a28edfde548bb612c33049bb821dc22abd148d1f071597d0f4f78395d53997a2976ebf9a2c22fccb8a108899f1331eed81386dc5b263d
-
SSDEEP
12288:BvXsETlBnPVibcHXn+XrKiE9DamsHaEcdrVQilrJQwhe9aEAyvU:BvsEJR8bwfUH8rVQilrmwA9
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2280-1-0x0000000000400000-0x00000000005C4000-memory.dmp upx behavioral1/memory/2280-4-0x0000000000400000-0x00000000005C4000-memory.dmp upx behavioral1/memory/2280-5-0x0000000000400000-0x00000000005C4000-memory.dmp upx behavioral1/memory/2280-6-0x0000000000400000-0x00000000005C4000-memory.dmp upx behavioral1/memory/2280-7-0x0000000000400000-0x00000000005C4000-memory.dmp upx behavioral1/memory/2280-20-0x0000000000400000-0x00000000005C4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SmartIndex = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f1333e33b3304fbd79dfa7f0bc2c3e51_JaffaCakes118.exe" f1333e33b3304fbd79dfa7f0bc2c3e51_JaffaCakes118.exe