Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe
-
Size
220KB
-
MD5
1486a882ccf629c14dbb6d623d31eff9
-
SHA1
24077b5b18d36dd48886a74da3a288dc47789da1
-
SHA256
47d2757641798ab26d82b55410144f4e6e1deb67214437d4c3ab0109a7febccd
-
SHA512
ca1c34524f48c92265e7a28c59bab5e21f1fa41ecfb1dfa81601c58760c77fe9b2983a538456ad811af7aa0e5b346b604db94beb2ec28b43efca28e197ae4416
-
SSDEEP
3072:w2jfPl3KjN2XHAzmerijfhdoG1lEqs7fpk4kv4KoK+XZqcgS0C6A3c1ksajJJ:wGKjN2XHAVMvoOWkv8K8ZqhX1knL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2188 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2188 2936 1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2188 2936 1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2188 2936 1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2188 2936 1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe 28 PID 2188 wrote to memory of 1316 2188 cmd.exe 30 PID 2188 wrote to memory of 1316 2188 cmd.exe 30 PID 2188 wrote to memory of 1316 2188 cmd.exe 30 PID 2188 wrote to memory of 1316 2188 cmd.exe 30 PID 2188 wrote to memory of 3000 2188 cmd.exe 31 PID 2188 wrote to memory of 3000 2188 cmd.exe 31 PID 2188 wrote to memory of 3000 2188 cmd.exe 31 PID 2188 wrote to memory of 3000 2188 cmd.exe 31 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1316 attrib.exe 3000 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Adobe\FLASHP~1\ASSETC~1\4WCQK5S3\225FTM~1.BAT2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Local\Temp\1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe"3⤵
- Views/modifies file attributes
PID:1316
-
-
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\AssetCache\4WCQK5S3\225F.tmp.bat"3⤵
- Views/modifies file attributes
PID:3000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524B
MD5f77f40f904a751d5df5df2ffc126bc2e
SHA14d7343e1148e4c992adb9c0a1187fdac0c2cbec7
SHA2560bbf1de94312810c2811bddd8ac2ade1721f3c2c5a7c128bc892bf147eaee84d
SHA5127c134fca3fcbcfbe4b6cb70d56699999741cc78b41420699c10ecce6b4064076f930bbd75dbb25894a6304838f644500eb869720b3b7f677c8f05e143b66c6a0