Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe
-
Size
391KB
-
MD5
0049f3e822314897cb98ce47825fa645
-
SHA1
0e286a6b8f59f1b555facb2604afad39a1433f92
-
SHA256
7b78ae1493693935b410ba9d252d2358bc8a4f11c2cc29bb6429454ef4c7b572
-
SHA512
f4f824a77bf317bc2e2927aa590fdbd07b17706ba01ab17b778699b0813439049edbc39a28498c890889bd1d97ee1a1fedc0924a07b9861845ea2680bbbb34ed
-
SSDEEP
6144:FhOZbxZ+Be8wGKmFTGT6cF6R5m9rBLICY0klFblVVlIG:FyxZ+B5wGKmFTBC6RolZRkBVVln
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2288 set thread context of 2060 2288 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2060 2288 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 28 PID 2288 wrote to memory of 2060 2288 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 28 PID 2288 wrote to memory of 2060 2288 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 28 PID 2288 wrote to memory of 2060 2288 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 28 PID 2288 wrote to memory of 2060 2288 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 28 PID 2288 wrote to memory of 2060 2288 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 28 PID 2060 wrote to memory of 1648 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 29 PID 2060 wrote to memory of 1648 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 29 PID 2060 wrote to memory of 1648 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 29 PID 2060 wrote to memory of 1648 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 29 PID 2060 wrote to memory of 2516 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 31 PID 2060 wrote to memory of 2516 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 31 PID 2060 wrote to memory of 2516 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 31 PID 2060 wrote to memory of 2516 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 31 PID 2060 wrote to memory of 2584 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 32 PID 2060 wrote to memory of 2584 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 32 PID 2060 wrote to memory of 2584 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 32 PID 2060 wrote to memory of 2584 2060 0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\0049f3e822314897cb98ce47825fa645_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0049f3e822314897cb98ce47825fa645_JaffaCakes118.exe2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\cmd.execmd.exe /c %systemdrive% && cd %appdata% && cd Mozilla\Firefox\Profiles && dir /B /O:-D > c:\dateiname.txt3⤵PID:1648
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c md c:\ende3⤵PID:2516
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c %systemdrive% && cd %appdata% && cd Mozilla\Firefox\Profiles && cd 9bot8sq2.default-release&& copy key3.db c:\ende && copy signons.txt c:\ende && copy history.dat c:\ende3⤵PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD52a10e2abc9c0c0f985dc1523765946db
SHA1c51fd28de2870be8263360d188d6fbb3b41b9ebf
SHA2565d48213800eac8b7f3e4b1af18779f83565a186bcc2919654a5a26d1dfdf968f
SHA5127a4c691b0003ee0933f06c06b717baa2265489681658da57d73a5cb52780b81646e7fa1bfd0889ee663468a1a4b54e01cee5fce1124a9400dbb36c1ee19da17d