Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 08:35

General

  • Target

    254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe

  • Size

    170KB

  • MD5

    254c3481a70fdceeb944670bd4e76447

  • SHA1

    54700ef02d21c4b4aa2c71bef1ba9ff3270cfa6a

  • SHA256

    456f2d833c4d7073ffe8cfa0eba1b4164d4a6229bb24a733c5e4885802247628

  • SHA512

    0b324bfac46af7077696fe226ab007fd85fd9f033ef5e64070691136682601afd441c03bcecbadacc23b353e35e3d9f084ecffa44ef13cbfa38a2df2930864ef

  • SSDEEP

    3072:YJteSOlkOgXZ2SbmezHOBWm04zJH0ezncBoB9TTnwhNK02GfM:+enkZ29EZmVjLcBYTnyKI

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Users\Admin\AppData\Local\Temp\254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
        PID:1808
      • C:\Users\Admin\AppData\Local\Temp\254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\254c3481a70fdceeb944670bd4e76447_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:1348

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\F7B0.617

        Filesize

        1KB

        MD5

        0775cd33fc318499c9b259176bde6749

        SHA1

        00818bca355c54180d7e6af1fbe8e589365f4a0c

        SHA256

        2d61132b39e252700246edbfb73cd8c0dea6f9043504310fade1803bfc126160

        SHA512

        1e66b09d4c9dc2793af674f5198e56bfc79a17e794970da6fea6bebcd38117c8f3afc6c4e7a66653de06b6cc38711d729bb3cc18325aea372c1dadb64c67e48e

      • C:\Users\Admin\AppData\Roaming\F7B0.617

        Filesize

        600B

        MD5

        afd25c5f4189d102524a66946048cf1c

        SHA1

        b102ce60b7f285f7a748cdd823f84a10078b15a0

        SHA256

        d22f175c9be7b32d82ce4cb7c9f4d67ad97921a09fee8ee6ca14ad48ed0fd178

        SHA512

        1561f33e01f5e90adecb9d740786892b579984d74db3b8acc4c4f0c68c6e24b7f9ae5f49735ad1b74429979bdfb374feb9d7f71ebf45777e59c9115ff5e5a363

      • memory/1316-1-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/1316-81-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/1316-155-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/1348-80-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/1348-152-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/1808-13-0x000000000059B000-0x00000000005B4000-memory.dmp

        Filesize

        100KB

      • memory/1808-12-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB