Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 11:52
Static task
static1
Behavioral task
behavioral1
Sample
6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe
-
Size
973KB
-
MD5
6e6a93e97a48833d237b3be0caa3e81b
-
SHA1
ad09d0e3bc8b8e7a7037f2d7a1d46f1926eba5ac
-
SHA256
410e19b2b853c9349fba11e68017dfde7274089d5aa9b163bd650eb6c32135ac
-
SHA512
a8c889d7f8d8ba878e48b38777d85920321726ecada25b4a1f5b89af86045b5301a5a6315081190335162ffb063b9ea9181890009d819ae61d57324d66f86fd1
-
SSDEEP
24576:K+wU+0GRJBMyaosJdRnPUKGh6qltQpoRGbkZMA0uSrr77wH5:IR0GRJ5RsBPUKGhtQugkZO9a5
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exepid process 4756 6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe 4756 6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exepid process 4756 6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe 4756 6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe 4756 6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe 4756 6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e6a93e97a48833d237b3be0caa3e81b_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4436,i,7012731823941922179,12386606396608877869,262144 --variations-seed-version --mojo-platform-channel-handle=4376 /prefetch:81⤵PID:4316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD505801c3f3fb3bd03f594d80f64829489
SHA1be662521d38d8dcf6d341ad097d8a9e3bea20366
SHA2566593f6bf325a3f06b3be610ff69d8b06bdafe13db266eefccd9c277d146be60c
SHA5120f326db23d41c99a5de97a76a2ce116021fb2061a321d82ebe32513465a6b7b4523f72380013cafcd3f83d33d635378d4af8b2f3ee1de49b753f2a296a3fbb66
-
Filesize
3KB
MD51fffd38bcbcddd52c8f171812c897e14
SHA1753f8226acab4970537358973d3aa9cff789617a
SHA256e065105abe1d41c492e6097958e497cbf120589122d15c04a0791c30f63a770f
SHA512b092d5e2ca6623a2875b8e9005a27c189cc2ac6cdf7815f4da179d253ac0419a7ae16e96f9357b09655b843d9d71842a94d9faa62415d74df3b2bc0b643e7a8d
-
Filesize
27KB
MD560f34e6b09d2244e5576131dc91e1631
SHA1144183bb0d4de6ced00d2c0c0fe32bb51f744fe6
SHA256317ccb762831c8cd4e64e45a5368ab53e34eb64b0fc09fb6cf68ddde97119c1a
SHA512b544b05e8486e8faa581a7874a7084ed7331e499b8c68110ff2b816516c62c10b87afc01d5e782b9e534c3f209a738e13d75b94c81426830a93b6f2c18b357cd