Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe
-
Size
153KB
-
MD5
1a30a38165c6d19e169aa5c001e34637
-
SHA1
d7faa9479fb7686ee7be2312d6eadcc403e10d21
-
SHA256
5ed3a5ba116178ab08d433d7e68dccd9e563e65be72f69123f8aa25c5f2dd402
-
SHA512
e5085f6711ec6d421fb43f9224da14a78b571bc58154ac0490fdede719b3f93764dea074275108a98a45584716c3e35c5b401b64122aa0b0600be9a3e930bcef
-
SSDEEP
3072:TUwcIR1Vr9R8BOBzkQI1vnKX7Y/47x4AVO0HvIbsfnGyYKfTk:T66VrKEQNKX7Y8O0HQbsfnGNKrk
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1732-2-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2724-6-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2724-5-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1028-78-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1732-80-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1732-81-0x0000000000400000-0x0000000000442000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2724 1732 1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe 28 PID 1732 wrote to memory of 2724 1732 1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe 28 PID 1732 wrote to memory of 2724 1732 1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe 28 PID 1732 wrote to memory of 2724 1732 1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe 28 PID 1732 wrote to memory of 1028 1732 1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe 30 PID 1732 wrote to memory of 1028 1732 1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe 30 PID 1732 wrote to memory of 1028 1732 1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe 30 PID 1732 wrote to memory of 1028 1732 1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59f65b46d580d5ee4799f6d848f9be9cf
SHA195443e6f2aaee27cae14374dc3110cec0b063e3f
SHA256d7515db418856abace64396373d846b92bf277d7af2563395b2a2167c8c66e6b
SHA5124d154394a51c773f92eca8959fd9de58fccc1ed0c59a47bbce5db91c99d6a20f8752e612299c3349331e63f75b807a60be2979af3e844e54169dd3d23039c741
-
Filesize
600B
MD59999788822c62f45e316902c511c80af
SHA1e5b49260522e76e23f9cac98f868661907dd098c
SHA256475ca79fb875785abbea55b99210f815ddcbec3d0714fedf578c2dba87ea4ded
SHA51235db78665c90e37789f6626a9ebbd4438b7c5e7b2b8fbf170e2e1f853c8d5c13ae83d1af774a20bbd4ee467126e6f4eb00c887ea0d7d57695e207959e077c3a4