Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe
-
Size
184KB
-
MD5
0cd0dd1904638215157c36f24e06caa2
-
SHA1
b102caa6a7a53d2da8f62dde8b1ee980a875d8f8
-
SHA256
44fb2a75f5289d706f6e37b0822d3f8d57ef3564867c9b95c2a4851d239b6930
-
SHA512
b5ecb30e8fb3fcfea23babcadd022af043e8b2af38f671a5b446b50e4301eed22a3433c43e1ca55d581f1f2e35ee40a32f96c9e06d1a1c09992bda84f1a32d3f
-
SSDEEP
3072:ily9pu6qS5y+H0S2ql9PqbmmTOCkvibJgZt56p79I7E+zg07lFc80tIMfqMp4s4H:iA9p+S5dUfqf+NTOCkpn5o79cg0pFc5J
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/812-1-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/812-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4296-12-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/4296-11-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/812-75-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/812-77-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/1960-85-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1960-84-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/812-152-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 812 wrote to memory of 4296 812 0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe 81 PID 812 wrote to memory of 4296 812 0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe 81 PID 812 wrote to memory of 4296 812 0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe 81 PID 812 wrote to memory of 1960 812 0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe 82 PID 812 wrote to memory of 1960 812 0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe 82 PID 812 wrote to memory of 1960 812 0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe startC:\Program Files (x86)\LP\035A\88C.exe%C:\Program Files (x86)\LP\035A2⤵PID:4296
-
-
C:\Users\Admin\AppData\Local\Temp\0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\A5E0A\E043D.exe%C:\Users\Admin\AppData\Roaming\A5E0A2⤵PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5954c668beca83fb1598b603dbb56bd36
SHA1dc54fd14116592fa26c34da4d3a9842dc1a56466
SHA256c977050e1c535fe78692066f4b3f0e2c41a8f925a2046c0b8b377716af19f91e
SHA5120b94e392263026fa53c73b9b87da3983f7c338047610ddb730e2716efbc081c86b3ac64d23a256f13431d2fcd94d89d824159a0d1f142f2f865f48ecf97aedba
-
Filesize
996B
MD5afb6461bbafaebd2c7511415f27a91e4
SHA1683ab5bf7a279c884d128fd20727faa204a939b9
SHA256bc9586d1788fd5ac88777f16aad1b8d21c7c9305ef0e5da43068a8d77533a3f9
SHA51276e2875e686c3a67bc2fafbf74f80a0a5449c2c40299dbdb47b8839527b77f2ee129d6863c7a07db36778a4ebf7e17f15e698775f4dde2c54ece18771de85d34