Analysis
-
max time kernel
79s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
1ad13db20d8eaaa6f0ecc05858124b9c_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
1ad13db20d8eaaa6f0ecc05858124b9c_JaffaCakes118.exe
-
Size
49KB
-
MD5
1ad13db20d8eaaa6f0ecc05858124b9c
-
SHA1
ad233303f639a749c29f547d456af2e7bfc432a6
-
SHA256
c38b06821567334d5ac4b5533087f78d4ca4b958afd399e4ac38cf254b592ada
-
SHA512
442e5d440fdb3eeb354487586b88ea7bda100facb7082199a5d0689ccc9b0d9daf070d63b6e205dbc67ca93f70b3557e0a8bd553d934abbc330c852c633538a9
-
SSDEEP
768:Mif9oOoP3nl5fJS767LF2NaBJdgwG8y3J7IAKHszsFW7W2srzmrblUlnuwF:n9ozvnffM67LF2NaRgwIpxK1TVOrJUpD
Malware Config
Signatures
-
Nirsoft 1 IoCs
resource yara_rule behavioral2/memory/552-22-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 1ad13db20d8eaaa6f0ecc05858124b9c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 552 pwnd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x00070000000233af-14.dat upx behavioral2/memory/552-22-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4532 wrote to memory of 552 4532 1ad13db20d8eaaa6f0ecc05858124b9c_JaffaCakes118.exe 82 PID 4532 wrote to memory of 552 4532 1ad13db20d8eaaa6f0ecc05858124b9c_JaffaCakes118.exe 82 PID 4532 wrote to memory of 552 4532 1ad13db20d8eaaa6f0ecc05858124b9c_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ad13db20d8eaaa6f0ecc05858124b9c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1ad13db20d8eaaa6f0ecc05858124b9c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Temp\pwnd.exe"C:\Temp\pwnd.exe" /stext pwnd.txt2⤵
- Executes dropped EXE
PID:552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD568106cc9cbdaea9a900b5759db898bb7
SHA15bb7ad550ece59cb7726464e91e6780eae711a69
SHA256ba0680e722dcda3adc7a5ec95d920e961a2db7769b303b0593a0d9b20d1018f8
SHA512c66c7a79d212b372dc88575bae2c20b173e2b541183efe91be0b13b6906f3d712a0ac472c616ccaf9769e1a048d400d0daf06579508a1e2697090d41bb5e28b4
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84