Analysis
-
max time kernel
150s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 12:56
Behavioral task
behavioral1
Sample
29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe
Resource
win7-20240705-en
5 signatures
150 seconds
General
-
Target
29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe
-
Size
459KB
-
MD5
29fd98538352513258ce3e227557c0e8
-
SHA1
852f37b2eeed6245436a496d729b3aa7e5e14e68
-
SHA256
5c7e4b927889538272ab2f56bafa0cf9cd87973c3a388a1a9a7d2d11a0ee2071
-
SHA512
f240ec1c990fdf7ee3615e48d382e3d0422f7931e2febde458a01931d823e5335b7f2062fb705d233339df8df0ae5748032c0eede64ccf9cfd0df8c03931a8af
-
SSDEEP
12288:a3aOZZnaNk09pBKhWSzJmNoVqsd5yAi8YWeR+:a3aMZnSk09pCWSzvf4Ai8vU+
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe File created C:\Windows\system32\drivers\etc\hosts 29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2732-0-0x0000000000430000-0x00000000004D4000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2732 29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe 2732 29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe