Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe
-
Size
170KB
-
MD5
254c3481a70fdceeb944670bd4e76447
-
SHA1
54700ef02d21c4b4aa2c71bef1ba9ff3270cfa6a
-
SHA256
456f2d833c4d7073ffe8cfa0eba1b4164d4a6229bb24a733c5e4885802247628
-
SHA512
0b324bfac46af7077696fe226ab007fd85fd9f033ef5e64070691136682601afd441c03bcecbadacc23b353e35e3d9f084ecffa44ef13cbfa38a2df2930864ef
-
SSDEEP
3072:YJteSOlkOgXZ2SbmezHOBWm04zJH0ezncBoB9TTnwhNK02GfM:+enkZ29EZmVjLcBYTnyKI
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1316-1-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1808-12-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1348-80-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1316-81-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1316-155-0x0000000000400000-0x0000000000445000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1808 1316 254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe 28 PID 1316 wrote to memory of 1808 1316 254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe 28 PID 1316 wrote to memory of 1808 1316 254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe 28 PID 1316 wrote to memory of 1808 1316 254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe 28 PID 1316 wrote to memory of 1348 1316 254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe 30 PID 1316 wrote to memory of 1348 1316 254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe 30 PID 1316 wrote to memory of 1348 1316 254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe 30 PID 1316 wrote to memory of 1348 1316 254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50775cd33fc318499c9b259176bde6749
SHA100818bca355c54180d7e6af1fbe8e589365f4a0c
SHA2562d61132b39e252700246edbfb73cd8c0dea6f9043504310fade1803bfc126160
SHA5121e66b09d4c9dc2793af674f5198e56bfc79a17e794970da6fea6bebcd38117c8f3afc6c4e7a66653de06b6cc38711d729bb3cc18325aea372c1dadb64c67e48e
-
Filesize
600B
MD5afd25c5f4189d102524a66946048cf1c
SHA1b102ce60b7f285f7a748cdd823f84a10078b15a0
SHA256d22f175c9be7b32d82ce4cb7c9f4d67ad97921a09fee8ee6ca14ad48ed0fd178
SHA5121561f33e01f5e90adecb9d740786892b579984d74db3b8acc4c4f0c68c6e24b7f9ae5f49735ad1b74429979bdfb374feb9d7f71ebf45777e59c9115ff5e5a363