Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 03:58
Behavioral task
behavioral1
Sample
052380fedbdd69d113d65e284f4f3d24_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
052380fedbdd69d113d65e284f4f3d24_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
052380fedbdd69d113d65e284f4f3d24_JaffaCakes118.exe
-
Size
5.6MB
-
MD5
052380fedbdd69d113d65e284f4f3d24
-
SHA1
9a6f7e15e648c05543a22efd4c8534022695c245
-
SHA256
f96d345692603748dd0f5bfc0e90c2019778a522e5b8a4bfabdd989e1fab0af4
-
SHA512
146425d6e7016ff81343461489e90304b3e59470e13628815113de9f32b60312e31ce7d70d6e3ffb2807c3b882b75a264f5db3fe8fc9cc28b26313ee48f690f5
-
SSDEEP
98304:zXMY/4RLa+qlHw7mYzWa+VXDDCpP/+6Tuqn6CGHVsuhy:og4R2+qtw7mT8GPqn6CG1s+
Malware Config
Signatures
-
Panda Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/4936-5-0x0000000000020000-0x0000000000968000-memory.dmp family_pandastealer behavioral2/memory/4936-6-0x0000000000020000-0x0000000000968000-memory.dmp family_pandastealer behavioral2/memory/4936-33-0x0000000000020000-0x0000000000968000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/4936-5-0x0000000000020000-0x0000000000968000-memory.dmp shurk_stealer behavioral2/memory/4936-6-0x0000000000020000-0x0000000000968000-memory.dmp shurk_stealer behavioral2/memory/4936-33-0x0000000000020000-0x0000000000968000-memory.dmp shurk_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4936-5-0x0000000000020000-0x0000000000968000-memory.dmp vmprotect behavioral2/memory/4936-6-0x0000000000020000-0x0000000000968000-memory.dmp vmprotect behavioral2/memory/4936-33-0x0000000000020000-0x0000000000968000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4936 052380fedbdd69d113d65e284f4f3d24_JaffaCakes118.exe 4936 052380fedbdd69d113d65e284f4f3d24_JaffaCakes118.exe 4936 052380fedbdd69d113d65e284f4f3d24_JaffaCakes118.exe 4936 052380fedbdd69d113d65e284f4f3d24_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\052380fedbdd69d113d65e284f4f3d24_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\052380fedbdd69d113d65e284f4f3d24_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4168,i,11069752405888604640,8928124405695604965,262144 --variations-seed-version --mojo-platform-channel-handle=2732 /prefetch:81⤵PID:4272