Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2024, 23:26

General

  • Target

    88b8441562f66e629334bde8b40132c2_JaffaCakes118.exe

  • Size

    510KB

  • MD5

    88b8441562f66e629334bde8b40132c2

  • SHA1

    e7eb07017b798bf17ac05f82c3f58957f0a66d1b

  • SHA256

    71a1b762cc640d1719150451591ba3db1f78d23d12998feaec3c87606059d144

  • SHA512

    cfa4f397fcea68fa0a8a165148b84ede970b989f4b0e67813c3f00d8c6d0e28a9ae25eff0ec7b25bbb504f6f4f8a2b0aee4c4dab3b1b5613b909a5c2c5825a81

  • SSDEEP

    6144:JknKx/nscytzoyWL9+vZTh6YI0t8CrbmsG5lDv62NvTXhCCCZPnMdVUGO74lubmO:Jk6s4552ZTh6ctSDBpjhbSPnwyGOgBY

Score
10/10

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88b8441562f66e629334bde8b40132c2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\88b8441562f66e629334bde8b40132c2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4256-0-0x0000000074DCE000-0x0000000074DCF000-memory.dmp

    Filesize

    4KB

  • memory/4256-1-0x0000000000FA0000-0x0000000001028000-memory.dmp

    Filesize

    544KB

  • memory/4256-2-0x0000000005990000-0x0000000005F34000-memory.dmp

    Filesize

    5.6MB

  • memory/4256-3-0x0000000074DC0000-0x0000000075570000-memory.dmp

    Filesize

    7.7MB

  • memory/4256-4-0x0000000005310000-0x0000000005376000-memory.dmp

    Filesize

    408KB

  • memory/4256-5-0x0000000006A80000-0x0000000006B12000-memory.dmp

    Filesize

    584KB

  • memory/4256-6-0x0000000074DCE000-0x0000000074DCF000-memory.dmp

    Filesize

    4KB

  • memory/4256-7-0x0000000074DC0000-0x0000000075570000-memory.dmp

    Filesize

    7.7MB