Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 13:18
Static task
static1
Behavioral task
behavioral1
Sample
0546a54f8496b237676fc4d76a118be6_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
0546a54f8496b237676fc4d76a118be6_JaffaCakes118.exe
-
Size
560KB
-
MD5
0546a54f8496b237676fc4d76a118be6
-
SHA1
e40ab389fc60b78f22cb40be854e1a0cedbc9e44
-
SHA256
10bea2ef88b743fbea832b3061db6a3738c6e62443073abebdd64867e624fad0
-
SHA512
95444e63888284a447f59882046d8906ccec0a56d971fa612c85d1d0a6b17905b60d1e6a2041c8d922c06853a89fb8e60e6cb94bfd412d6336221ce1ccc731a0
-
SSDEEP
12288:2lSaGklFSnYZQjKh4U+jSdeX5eK9cpcUBp:2pD4YZMJO6kK9chr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
qhc.exepid process 2152 qhc.exe -
Loads dropped DLL 2 IoCs
Processes:
0546a54f8496b237676fc4d76a118be6_JaffaCakes118.exepid process 2304 0546a54f8496b237676fc4d76a118be6_JaffaCakes118.exe 2304 0546a54f8496b237676fc4d76a118be6_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
Processes:
qhc.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy qhc.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini qhc.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol qhc.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI qhc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
0546a54f8496b237676fc4d76a118be6_JaffaCakes118.exedescription pid process target process PID 2304 wrote to memory of 2152 2304 0546a54f8496b237676fc4d76a118be6_JaffaCakes118.exe qhc.exe PID 2304 wrote to memory of 2152 2304 0546a54f8496b237676fc4d76a118be6_JaffaCakes118.exe qhc.exe PID 2304 wrote to memory of 2152 2304 0546a54f8496b237676fc4d76a118be6_JaffaCakes118.exe qhc.exe PID 2304 wrote to memory of 2152 2304 0546a54f8496b237676fc4d76a118be6_JaffaCakes118.exe qhc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0546a54f8496b237676fc4d76a118be6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0546a54f8496b237676fc4d76a118be6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\75aa1135\qhc.exe"C:\Users\Admin\AppData\Local\Temp/75aa1135/qhc.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5cc50921afdb646bdc854abc7df07a09e
SHA17ba97552c9123ecbd00ab627b3cbbcf5be1f13f5
SHA25600eb1e2da9c2a5e9d4d0b9cd107385abee8b09a44846be4fb534618cd741551c
SHA5124ec8ed57d25168bd93073c1f3c732c2976a46d4b37d2b33746198970c2ff4b56f31cd58d2ed05a12e343ec19c5a60ba3c36408a3956de2a78678dfb564aeb1a6
-
Filesize
740B
MD59215381d271d8b5d79ae43412e30e21b
SHA17241a2058eb758a382d1882878b5e7388973628b
SHA256fa0aa10c58608c35677066d79d64102edd6c06ff5979a5078ce9445ae41b5640
SHA51284321cc167550d099a09148966b202e56256968ae3720d5f9264328bdc909962f8a03d417f95f91cb8e79fc7933612c68a301af4afb55067ecf0ed2701df17c8
-
Filesize
409KB
MD5ef38514253e4dafb6823f236bc47bb5f
SHA1458a7dcb3c85cbe3c93eb7876fa0e6cd7e07f0f6
SHA2564c1f4446576780b1d9ebd6f3cb653375aacfe3fd37e542ab4d4f3616db82475e
SHA512853b8a5467d9c3800334807c0c0d558d4b42d201bb19927d10ab391d1ddad93abbbed8612f8d243362cfa2e0cb53f81610f68040db7ba554886b06fc6befe43f