Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 22:36

General

  • Target

    0638d8ba8c19fc56156872d4aa55f15f_JaffaCakes118.exe

  • Size

    204KB

  • MD5

    0638d8ba8c19fc56156872d4aa55f15f

  • SHA1

    c5aec98315a386032e7ded73be0a3c6b134d850a

  • SHA256

    3c8d88860ed33b59724ea2228797cc8b3140dac42178a65da7f8a109ec16d2a5

  • SHA512

    fc827911bf1dba278c3d63dde8848f6addab7c143bc27c7afd767f445b6b4484749b16bbef28528864329fcc8f8f655134a576e8c34290a83d079e01cb71ee79

  • SSDEEP

    3072:r6VCBoCKJT0Kcjv141aUcT1LAFt0sROpMl4Ka1b:rbB1KOHjvbthALlOg2

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0638d8ba8c19fc56156872d4aa55f15f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0638d8ba8c19fc56156872d4aa55f15f_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Enumerates system info in registry
    • outlook_win_path
    PID:1888

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1888-0-0x0000000000400000-0x0000000000435000-memory.dmp
    Filesize

    212KB