Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 11:52

General

  • Target

    6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe

  • Size

    973KB

  • MD5

    6e6a93e97a48833d237b3be0caa3e81b

  • SHA1

    ad09d0e3bc8b8e7a7037f2d7a1d46f1926eba5ac

  • SHA256

    410e19b2b853c9349fba11e68017dfde7274089d5aa9b163bd650eb6c32135ac

  • SHA512

    a8c889d7f8d8ba878e48b38777d85920321726ecada25b4a1f5b89af86045b5301a5a6315081190335162ffb063b9ea9181890009d819ae61d57324d66f86fd1

  • SSDEEP

    24576:K+wU+0GRJBMyaosJdRnPUKGh6qltQpoRGbkZMA0uSrr77wH5:IR0GRJ5RsBPUKGhtQugkZO9a5

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4756
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4436,i,7012731823941922179,12386606396608877869,262144 --variations-seed-version --mojo-platform-channel-handle=4376 /prefetch:8
    1⤵
      PID:4316

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bottom.jpg

      Filesize

      1KB

      MD5

      05801c3f3fb3bd03f594d80f64829489

      SHA1

      be662521d38d8dcf6d341ad097d8a9e3bea20366

      SHA256

      6593f6bf325a3f06b3be610ff69d8b06bdafe13db266eefccd9c277d146be60c

      SHA512

      0f326db23d41c99a5de97a76a2ce116021fb2061a321d82ebe32513465a6b7b4523f72380013cafcd3f83d33d635378d4af8b2f3ee1de49b753f2a296a3fbb66

    • C:\Users\Admin\AppData\Local\Temp\header.jpg

      Filesize

      3KB

      MD5

      1fffd38bcbcddd52c8f171812c897e14

      SHA1

      753f8226acab4970537358973d3aa9cff789617a

      SHA256

      e065105abe1d41c492e6097958e497cbf120589122d15c04a0791c30f63a770f

      SHA512

      b092d5e2ca6623a2875b8e9005a27c189cc2ac6cdf7815f4da179d253ac0419a7ae16e96f9357b09655b843d9d71842a94d9faa62415d74df3b2bc0b643e7a8d

    • C:\Users\Admin\AppData\Local\Temp\side.jpg

      Filesize

      27KB

      MD5

      60f34e6b09d2244e5576131dc91e1631

      SHA1

      144183bb0d4de6ced00d2c0c0fe32bb51f744fe6

      SHA256

      317ccb762831c8cd4e64e45a5368ab53e34eb64b0fc09fb6cf68ddde97119c1a

      SHA512

      b544b05e8486e8faa581a7874a7084ed7331e499b8c68110ff2b816516c62c10b87afc01d5e782b9e534c3f209a738e13d75b94c81426830a93b6f2c18b357cd