Analysis
-
max time kernel
127s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
0558490427bfa0c032a84833e99b4afc_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
0558490427bfa0c032a84833e99b4afc_JaffaCakes118.exe
-
Size
1018KB
-
MD5
0558490427bfa0c032a84833e99b4afc
-
SHA1
b4b61d3a41889b0d56830132b64e3635091f5db6
-
SHA256
d70e4742b50d2db0b5c2e90eab0870e1560a7541a465f3a1d4e796ba1e794cc0
-
SHA512
51f72654b790c4ec14a2a4a0b9cb21a79c61447555e3ad81d768956b548511c6560acd2b66519ff6bb16e653a9f053c3a421e7104f626f2296313689a2abfef4
-
SSDEEP
12288:U0BjVnAqXTX1LVQGPkEurwZu5x8/ks2UgUGl8DEUrgyHLEimZDPhTrAjjAtef:9nRTX1hQfJuu5x8/elO3gseZ1UjjAtef
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1772 tmppack.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2856 0558490427bfa0c032a84833e99b4afc_JaffaCakes118.exe 2856 0558490427bfa0c032a84833e99b4afc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2856 wrote to memory of 1772 2856 0558490427bfa0c032a84833e99b4afc_JaffaCakes118.exe 85 PID 2856 wrote to memory of 1772 2856 0558490427bfa0c032a84833e99b4afc_JaffaCakes118.exe 85 PID 2856 wrote to memory of 1772 2856 0558490427bfa0c032a84833e99b4afc_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\0558490427bfa0c032a84833e99b4afc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0558490427bfa0c032a84833e99b4afc_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\JIBVWNUROVOXXSDIPJP\tmppack.exe-y2⤵
- Executes dropped EXE
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bbccaf41a1428f1a33357a10bc094edb
SHA1612281956e1b9d895bbc078c271846f881e4c264
SHA25650fdf1d3cd943aea15616a56391e6f388ea42be11ea3c269412af5b09ef9fbaf
SHA512af6a25948746cfcdc0421ac1a96d2efa3fceaf9093c3931d25087d9c12258f06a410e7f7d5260d17d6dbdc00dde74df5b25cfda0260ac531a07b7a200ec41bb9
-
Filesize
981B
MD58a5e1aad7303d8174cf3ba5e3591624c
SHA15bc119db938869e24dc18f9f70a5039cefaa9b19
SHA256a3dc8aa222cb5edb0d18f4526a0b0859647b48b4bdc52a5c9431c4ec6779f538
SHA5123c5c491234024226e6486f7426ab941a38701e33a0d1c70012cd64080904c2ee3f4f792ed992e3e605357471bc4da30c661b843b6b2501c4bed4041c4a6bc390
-
Filesize
5KB
MD5bf9c108fed413e71a6ff2ee6fada6969
SHA1ee260fc6a0340a8c911f6541c951eb906fc1699d
SHA2566ddfb3c12f505a4c1dc57324c08798ba996e15e6800408a739bc0907776a4e7b
SHA5125552a40c349bf6202b0862a8245515a485abc7dd5064b84a9976e9072cf97dfdcff318a96a8fcd3fd0cae9da249ead4a4dce35fc995c7e9ec92a19a5b8fc7fb2
-
Filesize
1.3MB
MD59161de0c745a2467e8b1efa7fe828986
SHA185ae7bf18c3f0cc68a8489363d883594ace964ca
SHA256fb46408ed5b0aca2c7ad9f33916f09b212c720473ec3222eadd7b66383b4bc21
SHA51246b211ad8164ff11a4a48c5ad64478c148defe001cf9896354a0b002f9e1936ca251382a1f0ecf78e5a965557ad44716fd73c0456aae57543cb6d180e76ffd69
-
Filesize
561KB
MD5191daa51ab8e3dbe928711f001dc3adb
SHA184d307554c31dd13b5789109505b7394f34c7836
SHA256a39c78f61f42f22bfb40cfe9f56239bb15d7ea6ca153a5ded61c36997a61fa45
SHA5121b10db82956d2092bee5b0a3f954b47bbfe669193d04fb586545a8a8167d84dc1a6f8aab8bd0d1695145830c733e0fa3b2505223bd50495a65bae32b04837a51