Analysis
-
max time kernel
66s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 12:43
Behavioral task
behavioral1
Sample
0537ae629583f68cc2bc00efc59d7e55_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
0537ae629583f68cc2bc00efc59d7e55_JaffaCakes118.exe
-
Size
909KB
-
MD5
0537ae629583f68cc2bc00efc59d7e55
-
SHA1
9d86faf729616d0ae13b073e2f73e674417536c4
-
SHA256
06c34394aaa10f88ab6c755fe8fc3846dcad360850a67d037abd9804d07b30bb
-
SHA512
6ce90cd0ba091b1f25b991add4ab5e70912d927c1facc011ff484a04cb1a36e1927c3ee7dd50294223b09a013e0b0bdfa64bb87a7927ceffc8227e666e939f88
-
SSDEEP
24576:uQXz088WLzxDfgM1uylEjlISKfqrx0OGO31g7+RO:tXzkWxMQlgI/fJOq64
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
setup.exepid process 3864 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2620-0-0x0000000000DC0000-0x0000000001071000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\setup.exe upx behavioral2/memory/2620-6-0x0000000000DC0000-0x0000000001071000-memory.dmp upx behavioral2/memory/3864-7-0x0000000000EB0000-0x0000000001161000-memory.dmp upx behavioral2/memory/3864-8-0x0000000000EB0000-0x0000000001161000-memory.dmp upx behavioral2/memory/3864-9-0x0000000000EB0000-0x0000000001161000-memory.dmp upx behavioral2/memory/3864-10-0x0000000000EB0000-0x0000000001161000-memory.dmp upx behavioral2/memory/3864-11-0x0000000000EB0000-0x0000000001161000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
0537ae629583f68cc2bc00efc59d7e55_JaffaCakes118.exesetup.exepid process 2620 0537ae629583f68cc2bc00efc59d7e55_JaffaCakes118.exe 2620 0537ae629583f68cc2bc00efc59d7e55_JaffaCakes118.exe 3864 setup.exe 3864 setup.exe 3864 setup.exe 3864 setup.exe 3864 setup.exe 3864 setup.exe 3864 setup.exe 3864 setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0537ae629583f68cc2bc00efc59d7e55_JaffaCakes118.exedescription pid process target process PID 2620 wrote to memory of 3864 2620 0537ae629583f68cc2bc00efc59d7e55_JaffaCakes118.exe setup.exe PID 2620 wrote to memory of 3864 2620 0537ae629583f68cc2bc00efc59d7e55_JaffaCakes118.exe setup.exe PID 2620 wrote to memory of 3864 2620 0537ae629583f68cc2bc00efc59d7e55_JaffaCakes118.exe setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0537ae629583f68cc2bc00efc59d7e55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0537ae629583f68cc2bc00efc59d7e55_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
909KB
MD50537ae629583f68cc2bc00efc59d7e55
SHA19d86faf729616d0ae13b073e2f73e674417536c4
SHA25606c34394aaa10f88ab6c755fe8fc3846dcad360850a67d037abd9804d07b30bb
SHA5126ce90cd0ba091b1f25b991add4ab5e70912d927c1facc011ff484a04cb1a36e1927c3ee7dd50294223b09a013e0b0bdfa64bb87a7927ceffc8227e666e939f88