Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 13:17
Static task
static1
Behavioral task
behavioral1
Sample
08bcd418aeb3d497538fd90d77b1a748_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
08bcd418aeb3d497538fd90d77b1a748_JaffaCakes118.exe
-
Size
211KB
-
MD5
08bcd418aeb3d497538fd90d77b1a748
-
SHA1
4e357e4b803fa5aca6df682fddb3664d5fe1fa7e
-
SHA256
31aabd84716f6d792dec4dadf15675e94b79e6673bda4e39a1a21e43f5fdbd63
-
SHA512
640350e132f794c76d71011e819bb8b4785a059be396ef330676c5f5b3914c9c57b02936f9f22653325bb14894d698c49204924ba4af38adde1b4d3b7ed88277
-
SSDEEP
3072:0MnRoDWThRG0Jw0tqS+53QhMuQOnxXpExCtHXL7FT2s6hPpJqQmUjixwXg9FClZ:0MBTzqv3O9pExCtdt6hPbYoixww9FuZ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1280 92983.exe 2780 iStealer5.1.1.exe 2624 iStealer 5.0.1.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 iStealer 5.0.1.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1280 2436 08bcd418aeb3d497538fd90d77b1a748_JaffaCakes118.exe 28 PID 2436 wrote to memory of 1280 2436 08bcd418aeb3d497538fd90d77b1a748_JaffaCakes118.exe 28 PID 2436 wrote to memory of 1280 2436 08bcd418aeb3d497538fd90d77b1a748_JaffaCakes118.exe 28 PID 1280 wrote to memory of 2780 1280 92983.exe 29 PID 1280 wrote to memory of 2780 1280 92983.exe 29 PID 1280 wrote to memory of 2780 1280 92983.exe 29 PID 1280 wrote to memory of 2780 1280 92983.exe 29 PID 1280 wrote to memory of 2624 1280 92983.exe 30 PID 1280 wrote to memory of 2624 1280 92983.exe 30 PID 1280 wrote to memory of 2624 1280 92983.exe 30 PID 1280 wrote to memory of 2624 1280 92983.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\08bcd418aeb3d497538fd90d77b1a748_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08bcd418aeb3d497538fd90d77b1a748_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\92983.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\92983.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\iStealer5.1.1.exe"C:\Users\Admin\AppData\Local\Temp\iStealer5.1.1.exe"3⤵
- Executes dropped EXE
PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\iStealer 5.0.1.exe"C:\Users\Admin\AppData\Local\Temp\iStealer 5.0.1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5fe8a779657baca133d80b072c28a900f
SHA1d7b53c8b63fc359b396be56567c46d995bfbb6b2
SHA2565a510070541a2b9e634299bf77387dc452140eac5b3a8db2f6389f1d34367fc0
SHA51237322fdbbbf8f1fbcedf2e8624830a5f6d0290abaed1784de1227c48b1ba4d8ecaa4881500ac29f73458fb46a52ee65dd33efb973dd4288d6ab3e3b41bf31954
-
Filesize
156KB
MD52ae0fba00b72ab198056eaa88e9e52c6
SHA1534cb347eea783767ce41a699fcd340e6e25704b
SHA256e06217c0b32ce258dbfc3e8a87844122c9bec88ddfef55b2b53a13e5b33bcade
SHA512092a01e025b64bbfc5c263e70c2398a3c03c2a1101d4f4d34db60d737e539bbbf032aea845ca193228d0a727549668e6647c54a9b1e5cf7b1a6d0bf4bfefa304
-
Filesize
20KB
MD501ddc7d91fdfe41c7c762cdebdc62fb3
SHA197bdf3f267dada212c5e73019e41df74646954ee
SHA25655e0235deff17b893b2ee229b382ce7fa67fe8ee8d0b3bde556e1801c81607fc
SHA51276a4a7d8938edfa577af4f965010e0d2f358a7d33b26df12e7d0dea4ac09e34c9af28c7e3c2ab3bb57e73364de1224556d753b6dd5c1a258a3425f14143284d6