Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2024, 03:31

General

  • Target

    1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe

  • Size

    220KB

  • MD5

    1486a882ccf629c14dbb6d623d31eff9

  • SHA1

    24077b5b18d36dd48886a74da3a288dc47789da1

  • SHA256

    47d2757641798ab26d82b55410144f4e6e1deb67214437d4c3ab0109a7febccd

  • SHA512

    ca1c34524f48c92265e7a28c59bab5e21f1fa41ecfb1dfa81601c58760c77fe9b2983a538456ad811af7aa0e5b346b604db94beb2ec28b43efca28e197ae4416

  • SSDEEP

    3072:w2jfPl3KjN2XHAzmerijfhdoG1lEqs7fpk4kv4KoK+XZqcgS0C6A3c1ksajJJ:wGKjN2XHAVMvoOWkv8K8ZqhX1knL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 12 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Adobe\FLASHP~1\ASSETC~1\4WCQK5S3\225FTM~1.BAT
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2188
      • C:\Windows\SysWOW64\attrib.exe
        attrib -R -S -H "C:\Users\Admin\AppData\Local\Temp\1486a882ccf629c14dbb6d623d31eff9_JaffaCakes118.exe"
        3⤵
        • Views/modifies file attributes
        PID:1316
      • C:\Windows\SysWOW64\attrib.exe
        attrib -R -S -H "C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\AssetCache\4WCQK5S3\225F.tmp.bat"
        3⤵
        • Views/modifies file attributes
        PID:3000

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\FLASHP~1\ASSETC~1\4WCQK5S3\225F.tmp.bat

          Filesize

          524B

          MD5

          f77f40f904a751d5df5df2ffc126bc2e

          SHA1

          4d7343e1148e4c992adb9c0a1187fdac0c2cbec7

          SHA256

          0bbf1de94312810c2811bddd8ac2ade1721f3c2c5a7c128bc892bf147eaee84d

          SHA512

          7c134fca3fcbcfbe4b6cb70d56699999741cc78b41420699c10ecce6b4064076f930bbd75dbb25894a6304838f644500eb869720b3b7f677c8f05e143b66c6a0

        • memory/2936-2-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/2936-1-0x00000000002E0000-0x00000000002E1000-memory.dmp

          Filesize

          4KB