Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
28a779e57c528ee1e1ef7d2fd1048507_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
28a779e57c528ee1e1ef7d2fd1048507_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
28a779e57c528ee1e1ef7d2fd1048507_JaffaCakes118.exe
-
Size
510KB
-
MD5
28a779e57c528ee1e1ef7d2fd1048507
-
SHA1
5a3fb5503eb136ae5b6cebbbb0879eb68b5b9a1a
-
SHA256
47fbc12fb984dbf4e5eb037c95e2b04936134a4fa8961cbc020d8db2884fe9db
-
SHA512
64b0dccf0e86836710e84d2a754c8e9f0fc8837db00f9af5cdde487eb0e48a7a7a20100334afca8acc03a5cea4926bb2dd8e8fe55a57421c4ae66047024c2a42
-
SSDEEP
6144:m/8Xef0S98+h7mXuzwUj7iP/igTwCm9XtyoUpr7g1C/qFrhW14lWNllQl:2Uef0S98wqqjK/j0CmOrk1bdWalWNls
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\comWab = "C:\\WINDOWS\\comWab.exe" 28a779e57c528ee1e1ef7d2fd1048507_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\comWab.exe 28a779e57c528ee1e1ef7d2fd1048507_JaffaCakes118.exe File opened for modification C:\WINDOWS\comWab.exe 28a779e57c528ee1e1ef7d2fd1048507_JaffaCakes118.exe