Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
6f45af8d151c58dcdd7e976af28a1c3f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f45af8d151c58dcdd7e976af28a1c3f_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6f45af8d151c58dcdd7e976af28a1c3f_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
6f45af8d151c58dcdd7e976af28a1c3f
-
SHA1
7260dee5c36bba8a0716c6d8ba43111f7f2d341b
-
SHA256
57bee17d6b57eb6263298857747bfc9156eb38be58688f92ca14abd131d69375
-
SHA512
7c50eef85b7536a56ff83dab0ae84569fcdbdccb764a658955fce3f8472c1cd7427e1456ad0a855e32d3affdd44bdbf40dff4a4fc0d6ccd5b305e06906ddf756
-
SSDEEP
24576:0yFnRBBmPMxUp6/RPK1Vf/cBTOZYBgqXYyAi:tHAq5BTzq7i
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/4296-1-0x0000000000400000-0x0000000001BCA000-memory.dmp upx behavioral2/memory/4296-4-0x0000000000400000-0x0000000001BCA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6f45af8d151c58dcdd7e976af28a1c3f_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6f45af8d151c58dcdd7e976af28a1c3f_JaffaCakes118.exe" 6f45af8d151c58dcdd7e976af28a1c3f_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
6f45af8d151c58dcdd7e976af28a1c3f_JaffaCakes118.exepid process 4296 6f45af8d151c58dcdd7e976af28a1c3f_JaffaCakes118.exe