Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
6fed82a74c070d6163e4f47fffb19981_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
6fed82a74c070d6163e4f47fffb19981_JaffaCakes118.exe
-
Size
554KB
-
MD5
6fed82a74c070d6163e4f47fffb19981
-
SHA1
552003efb5079a58adb119d1ce5b30733ff9d241
-
SHA256
23226398d73d479d8972b2337025242c8db86397c8f0284400cbe71661156285
-
SHA512
356a6330cbd1eca9be43fc2df3d560bb02720053d832462df820e32a3a1370dd27d85f964e6e21c42260cd5af18e614732525f0ecc39729e0a6cd42409e9eead
-
SSDEEP
12288:UsLSQt0pkJ6KZ9jlkBdX2Gl45ZLRt100sa3wDhM6tpWgXrqPmRc8z:UsLS2XZ9jlch2GKZ310G3wBpqIc8z
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6fed82a74c070d6163e4f47fffb19981_JaffaCakes118.exedescription pid process target process PID 4516 wrote to memory of 1816 4516 6fed82a74c070d6163e4f47fffb19981_JaffaCakes118.exe cmd.exe PID 4516 wrote to memory of 1816 4516 6fed82a74c070d6163e4f47fffb19981_JaffaCakes118.exe cmd.exe PID 4516 wrote to memory of 1816 4516 6fed82a74c070d6163e4f47fffb19981_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fed82a74c070d6163e4f47fffb19981_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6fed82a74c070d6163e4f47fffb19981_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\968.bat2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\53484.exeFilesize
554KB
MD56fed82a74c070d6163e4f47fffb19981
SHA1552003efb5079a58adb119d1ce5b30733ff9d241
SHA25623226398d73d479d8972b2337025242c8db86397c8f0284400cbe71661156285
SHA512356a6330cbd1eca9be43fc2df3d560bb02720053d832462df820e32a3a1370dd27d85f964e6e21c42260cd5af18e614732525f0ecc39729e0a6cd42409e9eead
-
C:\Users\Admin\AppData\Local\Temp\968.batFilesize
175B
MD58d0df30878ebccf3c8e8bae0332786cf
SHA16a22bf5b713903a5f84785c84df8ebd73d397795
SHA256763183493300a465f31ede4eb8ecc0f7b95d85f2ef3771233a429ad740080a2a
SHA5126c8eb632e1592d642e95a94b7706e31dab0020b208611899ebd2398da5606a92c561281f82f7af088d0545f9d8906e2f1416bc7fb20477a468c0013263d2c9a0
-
memory/4516-0-0x0000000010000000-0x0000000010127000-memory.dmpFilesize
1.2MB