Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 11:43

General

  • Target

    1b2a23c210f724701ee20134dd8b9b6f_JaffaCakes118.exe

  • Size

    176KB

  • MD5

    1b2a23c210f724701ee20134dd8b9b6f

  • SHA1

    ef533c90fdebe53f5735b586943cf395cac2129f

  • SHA256

    59ca0250355e1ab36084e39541a6e1cd07869a8e96f5c4c3bc0ba290a4276589

  • SHA512

    018fd6da3761e7fbdc5270fb055feeaa81d743959327f85ef73fd1afd8d034ac81f825590969bf1f57e898b2889704d46581aa1d3e1b249b3eecdd00d6d32951

  • SSDEEP

    3072:OblnYGRMOv/6JElJ6m/k+bD8yDDqhzJbn5BCMngmz+oFmR6XQfg9loG4LOG8WnC:OSGLJ6m/fX8kDqpJD5UMngmKoF6fpG4X

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b2a23c210f724701ee20134dd8b9b6f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1b2a23c210f724701ee20134dd8b9b6f_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Users\Admin\AppData\Local\Temp\1b2a23c210f724701ee20134dd8b9b6f_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\1b2a23c210f724701ee20134dd8b9b6f_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
        PID:2960
      • C:\Users\Admin\AppData\Local\Temp\1b2a23c210f724701ee20134dd8b9b6f_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\1b2a23c210f724701ee20134dd8b9b6f_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:2900

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\BC2B.AAE

        Filesize

        600B

        MD5

        7cbcfd101a9e48598a81573f2c196744

        SHA1

        bcf13d009abc63edddf1ec7d75d030537aa91049

        SHA256

        c65ac8c6e1cf07fa3df31df0252fcd5383b608fe17bd8490afc55e29fd07fce9

        SHA512

        8901c0ae1b1e4d3e599475a9d9750157f8cd0cae19166081f4e280ae20250f20bb2571fffc80f38d954af63e12c43d9d8fe4afde8e7920feb4bacb2d84e001c4

      • C:\Users\Admin\AppData\Roaming\BC2B.AAE

        Filesize

        1KB

        MD5

        41edf83e9341bfbdd8d42aa7a4dbc457

        SHA1

        3023fa962b07dbd45f06fe598be90878fdd9427d

        SHA256

        1540b987e1aecbc277f04b767d22dbd0ff35834024a4ca86a16af4a7189f0c3d

        SHA512

        e07f5d08cdd67dd9a61d0a8f8be4ade6eecd9288f9a4cbc7e20efb4b017cda1630aff10d17af307f00a0b89c51a9440ec5628cc521d7e05d0f6cf1d66c48045d

      • C:\Users\Admin\AppData\Roaming\BC2B.AAE

        Filesize

        996B

        MD5

        b35e4c6959ad61252c079cf7c3237d10

        SHA1

        36645b5c3db8d5a046d062db6345cd2fdf32f765

        SHA256

        de6540db179e69402f87b8607d08680d67f08df3449b0f412fc1efb511c4fd64

        SHA512

        bca9297b7b6334a93384e7743478b394f3b189ea1d1bc8307361b7f1fa2fbba676d1c3de05f5d61e27ed23a8d66395957eafbfeec623c764f9c4dc35410e0f8d

      • memory/532-1-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/532-2-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/532-82-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/532-184-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/2900-86-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/2900-83-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/2900-84-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/2960-8-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB

      • memory/2960-9-0x0000000000400000-0x000000000044B000-memory.dmp

        Filesize

        300KB