Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe
-
Size
585KB
-
MD5
f8b263978939f6cd85ef520db5fdfb6c
-
SHA1
0c4bbe02edb642566ef17473807b9fa4756aadaf
-
SHA256
604f82b0aa4f6298ab4ed1a3a5488759577f06e596b33885a9937b028a889a3c
-
SHA512
ba0ba5f8f0e8ee4f87661acffd4c0f0ecf17ab797a81a38e86ff7b774e5b67a0b3201ab4d6db1beeb940a7664e43c8595c669a3a0886883f5a6f6d649ecccd39
-
SSDEEP
12288:SG2tzSMJb9pZ5RgY2yUNK+upN35jGFpVMbonpEPH0zEBQM1SoSbmKZ7:SPxzKtrEPo2Qfbl7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1932 set thread context of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2488 1932 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 28 PID 2488 wrote to memory of 2632 2488 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2632 2488 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2632 2488 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2632 2488 f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8b263978939f6cd85ef520db5fdfb6c_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\699.bat3⤵PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
585KB
MD5f8b263978939f6cd85ef520db5fdfb6c
SHA10c4bbe02edb642566ef17473807b9fa4756aadaf
SHA256604f82b0aa4f6298ab4ed1a3a5488759577f06e596b33885a9937b028a889a3c
SHA512ba0ba5f8f0e8ee4f87661acffd4c0f0ecf17ab797a81a38e86ff7b774e5b67a0b3201ab4d6db1beeb940a7664e43c8595c669a3a0886883f5a6f6d649ecccd39
-
Filesize
175B
MD5a571f92147ea69ed7f52736900289a04
SHA13cb5d46d879b49752842245d574234f65940b08b
SHA256acb7f2c554be8b7439d063b7752318be46c8ab584b12f12065c910e22b999dba
SHA512876f9318c15fa90c7f6e1dff46359fb6870bba1b9fc4c0cad615dfacf2acb451f6d46779f183c1ead74a0ab1fd125b2b6f9d9b7e6d3768bae7952e7c54ab7f63