Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-06-2024 03:58

General

  • Target

    052380fedbdd69d113d65e284f4f3d24_JaffaCakes118.exe

  • Size

    5.6MB

  • MD5

    052380fedbdd69d113d65e284f4f3d24

  • SHA1

    9a6f7e15e648c05543a22efd4c8534022695c245

  • SHA256

    f96d345692603748dd0f5bfc0e90c2019778a522e5b8a4bfabdd989e1fab0af4

  • SHA512

    146425d6e7016ff81343461489e90304b3e59470e13628815113de9f32b60312e31ce7d70d6e3ffb2807c3b882b75a264f5db3fe8fc9cc28b26313ee48f690f5

  • SSDEEP

    98304:zXMY/4RLa+qlHw7mYzWa+VXDDCpP/+6Tuqn6CGHVsuhy:og4R2+qtw7mT8GPqn6CG1s+

Malware Config

Signatures

  • Panda Stealer payload 3 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • Shurk

    Shurk is an infostealer, written in C++ which appeared in 2021.

  • Shurk Stealer payload 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\052380fedbdd69d113d65e284f4f3d24_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\052380fedbdd69d113d65e284f4f3d24_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4936
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4168,i,11069752405888604640,8928124405695604965,262144 --variations-seed-version --mojo-platform-channel-handle=2732 /prefetch:8
    1⤵
      PID:4272

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4936-2-0x000000000009A000-0x00000000003CB000-memory.dmp

      Filesize

      3.2MB

    • memory/4936-0-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

      Filesize

      4KB

    • memory/4936-5-0x0000000000020000-0x0000000000968000-memory.dmp

      Filesize

      9.3MB

    • memory/4936-6-0x0000000000020000-0x0000000000968000-memory.dmp

      Filesize

      9.3MB

    • memory/4936-32-0x000000000009A000-0x00000000003CB000-memory.dmp

      Filesize

      3.2MB

    • memory/4936-33-0x0000000000020000-0x0000000000968000-memory.dmp

      Filesize

      9.3MB