Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/04/2024, 13:45 UTC

General

  • Target

    fa6e0187ef7cfea6cd62311f1d0da117_JaffaCakes118.exe

  • Size

    120KB

  • MD5

    fa6e0187ef7cfea6cd62311f1d0da117

  • SHA1

    07ea78318b4ba3e5dfd16db9f56095e8372fca86

  • SHA256

    5fc412dbc2a4b4984ffee36a413454aa54f8a4f41d916e367f7bcc0ddd490842

  • SHA512

    fcdd86c10db585a90c4b38a06240307bedbf1e299a18939b83d374dd44a798da7a55cb784dfbbd0869f4be28ddbc9c4cb05bcda65f4abf4fdfd1122fd87228dc

  • SSDEEP

    1536:CqQZ/Nus4phrF6RY5BDgWLXqnm4HVxjInkWrVFU/O9uSFAd2ZgkwVcl1:hcw6RYDgWLMm4snkWrL+SFA4ZgkqY1

Score
10/10

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • ElysiumStealer Support DLL 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa6e0187ef7cfea6cd62311f1d0da117_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa6e0187ef7cfea6cd62311f1d0da117_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2284

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll

    Filesize

    40KB

    MD5

    94173de2e35aa8d621fc1c4f54b2a082

    SHA1

    fbb2266ee47f88462560f0370edb329554cd5869

    SHA256

    7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f

    SHA512

    cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798

  • memory/2284-0-0x0000000001090000-0x00000000010B4000-memory.dmp

    Filesize

    144KB

  • memory/2284-2-0x0000000000280000-0x000000000028C000-memory.dmp

    Filesize

    48KB

  • memory/2284-3-0x0000000004940000-0x0000000004980000-memory.dmp

    Filesize

    256KB

  • memory/2284-1-0x0000000073F50000-0x000000007463E000-memory.dmp

    Filesize

    6.9MB

  • memory/2284-4-0x0000000076A20000-0x0000000076B30000-memory.dmp

    Filesize

    1.1MB

  • memory/2284-8-0x0000000073F50000-0x000000007463E000-memory.dmp

    Filesize

    6.9MB

  • memory/2284-9-0x0000000004940000-0x0000000004980000-memory.dmp

    Filesize

    256KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.