Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe
-
Size
591KB
-
MD5
020ebc6458731ea5132990ba59516bfb
-
SHA1
48293e02e8efcc4db69c0440f3fd3bd45fc9817f
-
SHA256
b67f4f25d5d2ed6c605ca204f28d94c0364e858e09539d9608a6e61452939f15
-
SHA512
dd48d851cd3d59f372e4ed673d5fff1bd8b7be703338568ea414f36d7023c67df93ecf9ebf550185089ce6cc13d65a885ee5b8cfd9b802f6704e8d00bc1f9233
-
SSDEEP
12288:j862Oi5XQhEeZHauP0MbadCGA7yeREK14sCbWFL2oQ2PXVo8C:j862Oi5XQhEeZHNbadWye74sCbjmC
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1436 set thread context of 1144 1436 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 80 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1436 wrote to memory of 1144 1436 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 80 PID 1436 wrote to memory of 1144 1436 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 80 PID 1436 wrote to memory of 1144 1436 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 80 PID 1436 wrote to memory of 1144 1436 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 80 PID 1436 wrote to memory of 1144 1436 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 80 PID 1436 wrote to memory of 1144 1436 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 80 PID 1436 wrote to memory of 1144 1436 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 80 PID 1436 wrote to memory of 1144 1436 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 80 PID 1436 wrote to memory of 1144 1436 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 80 PID 1144 wrote to memory of 2016 1144 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 87 PID 1144 wrote to memory of 2016 1144 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 87 PID 1144 wrote to memory of 2016 1144 020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\020ebc6458731ea5132990ba59516bfb_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\125.bat3⤵PID:2016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175B
MD5855ca4b669284bfe3072ccb35f99700e
SHA12b4e5815096ac9da5cf7742b87ad4ece4b331857
SHA256ed7ba78f3918512fef821df109e172faff5599491cb364c1ffb96f9c2d76c95d
SHA512e558fc90d36bae763afc605a1d28d73438a533cb2d74a436ebf177a31676c7bea240d841b0d8f95b9d43f405967b22317223f55b8a0f9d03f79c93a33b654349
-
Filesize
591KB
MD5020ebc6458731ea5132990ba59516bfb
SHA148293e02e8efcc4db69c0440f3fd3bd45fc9817f
SHA256b67f4f25d5d2ed6c605ca204f28d94c0364e858e09539d9608a6e61452939f15
SHA512dd48d851cd3d59f372e4ed673d5fff1bd8b7be703338568ea414f36d7023c67df93ecf9ebf550185089ce6cc13d65a885ee5b8cfd9b802f6704e8d00bc1f9233