Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 05:52

General

  • Target

    28932237c6d3b3b6bc98cf0f4daf81d7_JaffaCakes118.exe

  • Size

    961KB

  • MD5

    28932237c6d3b3b6bc98cf0f4daf81d7

  • SHA1

    7bb932c075d0a4404d0b8052124c1a35559dec22

  • SHA256

    42ba3e42c4c8f5d0a8b2e6b7aa4dab9effea0ab67670df9c3a7fbf43a00f9547

  • SHA512

    9050a31be6060e99b3af055706fc912eb098bf7ed8971b6b792d95e08a9abeba25b7f8beda2c19f22fa83c8839927257c5f338d61f1f8355d47a8e606b959f50

  • SSDEEP

    24576:ikQ1aOCco82PkHsddUplpYE+JglzGWqVgjsaxZiAvS5cSdS:r/co82CsrUplpYEZ1BjsEZy+

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28932237c6d3b3b6bc98cf0f4daf81d7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\28932237c6d3b3b6bc98cf0f4daf81d7_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1600
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2232 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1044

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bottom.jpg

      Filesize

      1KB

      MD5

      2a02f5cfb8ab6ef8da96cb6319199ec1

      SHA1

      e835817901cae81eb1a88cd76b08dc00b2e27111

      SHA256

      24f374f557014d78b3a19a6595caabedc7e9c496bcbfca3a84f0f4ff17196225

      SHA512

      05313d9c0d5af986f90c3b000074037bf8399fa5d9a29b8e7c9093dd748fb8ea8d66e51d443e0a8c2aa908f59e37d6ddc49b2f62141d15cc4f1fad1aa897fa3d

    • C:\Users\Admin\AppData\Local\Temp\header.jpg

      Filesize

      3KB

      MD5

      1fffd38bcbcddd52c8f171812c897e14

      SHA1

      753f8226acab4970537358973d3aa9cff789617a

      SHA256

      e065105abe1d41c492e6097958e497cbf120589122d15c04a0791c30f63a770f

      SHA512

      b092d5e2ca6623a2875b8e9005a27c189cc2ac6cdf7815f4da179d253ac0419a7ae16e96f9357b09655b843d9d71842a94d9faa62415d74df3b2bc0b643e7a8d

    • C:\Users\Admin\AppData\Local\Temp\side.jpg

      Filesize

      27KB

      MD5

      60f34e6b09d2244e5576131dc91e1631

      SHA1

      144183bb0d4de6ced00d2c0c0fe32bb51f744fe6

      SHA256

      317ccb762831c8cd4e64e45a5368ab53e34eb64b0fc09fb6cf68ddde97119c1a

      SHA512

      b544b05e8486e8faa581a7874a7084ed7331e499b8c68110ff2b816516c62c10b87afc01d5e782b9e534c3f209a738e13d75b94c81426830a93b6f2c18b357cd