Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 05:34

General

  • Target

    0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    0cd0dd1904638215157c36f24e06caa2

  • SHA1

    b102caa6a7a53d2da8f62dde8b1ee980a875d8f8

  • SHA256

    44fb2a75f5289d706f6e37b0822d3f8d57ef3564867c9b95c2a4851d239b6930

  • SHA512

    b5ecb30e8fb3fcfea23babcadd022af043e8b2af38f671a5b446b50e4301eed22a3433c43e1ca55d581f1f2e35ee40a32f96c9e06d1a1c09992bda84f1a32d3f

  • SSDEEP

    3072:ily9pu6qS5y+H0S2ql9PqbmmTOCkvibJgZt56p79I7E+zg07lFc80tIMfqMp4s4H:iA9p+S5dUfqf+NTOCkpn5o79cg0pFc5J

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Users\Admin\AppData\Local\Temp\0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe startC:\Program Files (x86)\LP\035A\88C.exe%C:\Program Files (x86)\LP\035A
      2⤵
        PID:4296
      • C:\Users\Admin\AppData\Local\Temp\0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\0cd0dd1904638215157c36f24e06caa2_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\A5E0A\E043D.exe%C:\Users\Admin\AppData\Roaming\A5E0A
        2⤵
          PID:1960

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\A5E0A\A4A9.5E0

        Filesize

        600B

        MD5

        954c668beca83fb1598b603dbb56bd36

        SHA1

        dc54fd14116592fa26c34da4d3a9842dc1a56466

        SHA256

        c977050e1c535fe78692066f4b3f0e2c41a8f925a2046c0b8b377716af19f91e

        SHA512

        0b94e392263026fa53c73b9b87da3983f7c338047610ddb730e2716efbc081c86b3ac64d23a256f13431d2fcd94d89d824159a0d1f142f2f865f48ecf97aedba

      • C:\Users\Admin\AppData\Roaming\A5E0A\A4A9.5E0

        Filesize

        996B

        MD5

        afb6461bbafaebd2c7511415f27a91e4

        SHA1

        683ab5bf7a279c884d128fd20727faa204a939b9

        SHA256

        bc9586d1788fd5ac88777f16aad1b8d21c7c9305ef0e5da43068a8d77533a3f9

        SHA512

        76e2875e686c3a67bc2fafbf74f80a0a5449c2c40299dbdb47b8839527b77f2ee129d6863c7a07db36778a4ebf7e17f15e698775f4dde2c54ece18771de85d34

      • memory/812-1-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/812-2-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/812-75-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/812-77-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/812-152-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/1960-85-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/1960-84-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4296-12-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/4296-11-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB