Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
6978d4fe770879c22f11d708eb6cfccb_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
6978d4fe770879c22f11d708eb6cfccb_JaffaCakes118.exe
-
Size
654KB
-
MD5
6978d4fe770879c22f11d708eb6cfccb
-
SHA1
d47db598072d3a81403a250b7da4ab4bb245a8bd
-
SHA256
06d94641bb476c5fa3d78b7059887790bdf2d173081e7a595523ba28e99a58e0
-
SHA512
faf749fd1a4193b98ce6c9687a470d44bb3491f344ea84472b0e8382061fd03ba3f5af6ff73da0c6f20b6b27a806faa101ede9e1053d66e7cbca73503f82c637
-
SSDEEP
12288:uR7M/rkoZZ4Umg7BABatP/FxgZxuKmUULT1zYzWuEnyP+A20:uR7WZZ4Umg7BAAwPuKmHAWLyGAl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
BUWqJ.exepid process 1940 BUWqJ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
Processes:
BUWqJ.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ganlifbpkcplnldliibcbegplfmcfigp\126\manifest.json BUWqJ.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\ganlifbpkcplnldliibcbegplfmcfigp\126\manifest.json BUWqJ.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\ganlifbpkcplnldliibcbegplfmcfigp\126\manifest.json BUWqJ.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\ganlifbpkcplnldliibcbegplfmcfigp\126\manifest.json BUWqJ.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\ganlifbpkcplnldliibcbegplfmcfigp\126\manifest.json BUWqJ.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6978d4fe770879c22f11d708eb6cfccb_JaffaCakes118.exedescription pid process target process PID 3008 wrote to memory of 1940 3008 6978d4fe770879c22f11d708eb6cfccb_JaffaCakes118.exe BUWqJ.exe PID 3008 wrote to memory of 1940 3008 6978d4fe770879c22f11d708eb6cfccb_JaffaCakes118.exe BUWqJ.exe PID 3008 wrote to memory of 1940 3008 6978d4fe770879c22f11d708eb6cfccb_JaffaCakes118.exe BUWqJ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6978d4fe770879c22f11d708eb6cfccb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6978d4fe770879c22f11d708eb6cfccb_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\2b175e92\BUWqJ.exe"C:\Users\Admin\AppData\Local\Temp/2b175e92/BUWqJ.exe"2⤵
- Executes dropped EXE
- Drops Chrome extension
PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d2e17fb4bb69995f49911e52fe07ef1b
SHA17d500f4dfb884206472ab654036a62d6cd786fd8
SHA256d9a291738c5186dbcd15ddd4d1d218aec804438288db82f4fdf2431dc448521c
SHA512c29e69959bdb70103d3943528fd6dd8aecc50d1ad8200044005b82adfe9f4befdc98365e2567711132fe3044480cbf40ca8f2cf5b700681e1d35ef7dba92843a
-
Filesize
451KB
MD543aa29bf4812910789cc2805d11f68af
SHA122c30000fa6e7a8fbc111fde7e1cb4c3795cd5f9
SHA25655ef27c7da3b60b65d524dd3ae3327506ffb035f78f6be5b793c71babeab8a04
SHA512604ef59a990547a1a0aeb2cd10a0ea695ffa1114f912befdf179004737a2cd032cd884c3fbc856834ec9c076fd0c54173ed5361b8b6ed0f33adb6f56f8813f89
-
Filesize
24KB
MD546c299bacb3a5e74513d1461854c66b7
SHA1c27c592525e2929a68971678c536b6af20aef46a
SHA25625293eb85c48d1b8d0af027fdd93d066fa8cfbc45dbffe4fabe7e9a191e4ed61
SHA512cad64bff9cae07aa3bc7851ca252e6613b3c3023af0ff89036f0f14cdb5287e7eeba2271abcbeb9686c67100205779667cc630567aff95a39fd2563cba28e92d
-
Filesize
143B
MD50c835c78fd9d888ac1afe8c3bf2d8d98
SHA13316f500cadec930d52553294e0e2100e921b39b
SHA25646a2a135fdcefe54c8d1798e95932a01343a6885859afea0a2256d709b43d2b3
SHA512de9411a2f600b3ff532ee4bd24c3a02b127b34373541eb2d4973a99402fe37ffaf666c60d7b22598a99a3520a356916ac2d3cad83a976ea11a4212007f4a49df
-
Filesize
7KB
MD50f9054279524b49954d32ced056eab06
SHA10ac7589c48d23a34332678572e3b02b3b3b39f5c
SHA25648d6e16558d7d331085cb09f3995660640e673f82244e4980193259418ca1e07
SHA51238684cfd6473c0f3b1a9b4ec78ea49b903d29bb95405fc0882954bccb49cb1f733c3d149e5046977b0f08808108c91680b45ca67d76868a99f4c75b9c05206dc
-
Filesize
7KB
MD5cff82b88669e188d6a5f77943a51ab87
SHA1209187eefb9c20871e2e426307ee4cea469dee6d
SHA25609501481648c593ddba3fa2378ab5c1cadebc4d9af47068a5715ab2934cd2fb9
SHA5120038096a96bfae386668e5a5c73bfa913c5533ebd4995b7d145ee3413f2efe4c658ffb952272a64c6b11d64619583c36de32471be4559d0c9d37a8804634ef04
-
Filesize
607B
MD59402760891e68386a100d13bc4026019
SHA1e3ef76864ebd8436caa1de78b0d74517d72b42fe
SHA256dff224b7f5749a00766e3df4943070d25de10162b746629513fcdf899c9a8627
SHA5129592332c1f6aabf170d337521017520ba9577e4f8401734c988feb8d69f7f144dd9ba04bee91b113564d64e2bed1254ff1fb62ec4152f67d89ae17982d3a007b