Analysis
-
max time kernel
129s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
741767e8b16288dd3b4937a2c50336f7_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
741767e8b16288dd3b4937a2c50336f7_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
741767e8b16288dd3b4937a2c50336f7
-
SHA1
5b5c13c77bfce13b31f298b0ef40e9c244d741f3
-
SHA256
3fb25a9fdd89d9e7e3eaa3fbf168021c088c210f2f6ae77afe410f1db6a036f2
-
SHA512
130bb4825dcf0181b7e6977a6d38e84501ef05683c26d472e09a618c5b9ef90f921f7cab7cc1b30779f6434f9e41bffbc06eeec2fa193a12c21bf109b6fa5817
-
SSDEEP
49152:rVnJZPkeI5prmfpfpG0cYyMQx5uUHskZQSKXIDQ9Tlur7mH9+JE3KfVSDOLl5a6b:pJxI5J4dyDxEcJoXIsZsr7K93gSDOf
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 741767e8b16288dd3b4937a2c50336f7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2984 741767e8b16288dd3b4937a2c50336f7_JaffaCakes118.exe 2984 741767e8b16288dd3b4937a2c50336f7_JaffaCakes118.exe