Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 21:40
Behavioral task
behavioral1
Sample
a2836c29692ee9ae822c08534211f59e_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a2836c29692ee9ae822c08534211f59e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a2836c29692ee9ae822c08534211f59e_JaffaCakes118.exe
-
Size
5.2MB
-
MD5
a2836c29692ee9ae822c08534211f59e
-
SHA1
34f81f08d1cf514c47c45fe015c7deedad5586ea
-
SHA256
bded92fc3f55d2cfa4e5ddcfc1e7c6eb86865842295b734c97d57764b8d71079
-
SHA512
054098e01c0710ccafee5711bc5655122cb6a62c0fc0e21076ee0da6b988bbc2abfb1b2abd62b18700d3fd1a44cb9a9fe2d16c01cfd59a01517af51de2ffb7af
-
SSDEEP
98304:W9Jgee6KtASkodwzhIH31dHPc61SmJ8VDnsl6Y/FIVhVd9WO9DFx6:TD6KtALowzus6kckDNY/0zH9
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2192-35-0x0000000000400000-0x0000000000C7A000-memory.dmp vmprotect behavioral1/memory/2192-39-0x0000000000400000-0x0000000000C7A000-memory.dmp vmprotect behavioral1/memory/2192-102-0x0000000000400000-0x0000000000C7A000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2192 a2836c29692ee9ae822c08534211f59e_JaffaCakes118.exe 2192 a2836c29692ee9ae822c08534211f59e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2192 a2836c29692ee9ae822c08534211f59e_JaffaCakes118.exe