Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 12:52

General

  • Target

    1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe

  • Size

    153KB

  • MD5

    1a30a38165c6d19e169aa5c001e34637

  • SHA1

    d7faa9479fb7686ee7be2312d6eadcc403e10d21

  • SHA256

    5ed3a5ba116178ab08d433d7e68dccd9e563e65be72f69123f8aa25c5f2dd402

  • SHA512

    e5085f6711ec6d421fb43f9224da14a78b571bc58154ac0490fdede719b3f93764dea074275108a98a45584716c3e35c5b401b64122aa0b0600be9a3e930bcef

  • SSDEEP

    3072:TUwcIR1Vr9R8BOBzkQI1vnKX7Y/47x4AVO0HvIbsfnGyYKfTk:T66VrKEQNKX7Y8O0HQbsfnGNKrk

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
        PID:2724
      • C:\Users\Admin\AppData\Local\Temp\1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\1a30a38165c6d19e169aa5c001e34637_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:1028

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\C7D3.37F

        Filesize

        1KB

        MD5

        9f65b46d580d5ee4799f6d848f9be9cf

        SHA1

        95443e6f2aaee27cae14374dc3110cec0b063e3f

        SHA256

        d7515db418856abace64396373d846b92bf277d7af2563395b2a2167c8c66e6b

        SHA512

        4d154394a51c773f92eca8959fd9de58fccc1ed0c59a47bbce5db91c99d6a20f8752e612299c3349331e63f75b807a60be2979af3e844e54169dd3d23039c741

      • C:\Users\Admin\AppData\Roaming\C7D3.37F

        Filesize

        600B

        MD5

        9999788822c62f45e316902c511c80af

        SHA1

        e5b49260522e76e23f9cac98f868661907dd098c

        SHA256

        475ca79fb875785abbea55b99210f815ddcbec3d0714fedf578c2dba87ea4ded

        SHA512

        35db78665c90e37789f6626a9ebbd4438b7c5e7b2b8fbf170e2e1f853c8d5c13ae83d1af774a20bbd4ee467126e6f4eb00c887ea0d7d57695e207959e077c3a4

      • memory/1028-78-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/1028-79-0x0000000000607000-0x000000000061D000-memory.dmp

        Filesize

        88KB

      • memory/1732-2-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/1732-80-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/1732-81-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2724-6-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2724-5-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB