Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
2b7ce0a91e2dfb35169d176bfe6bea63_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b7ce0a91e2dfb35169d176bfe6bea63_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b7ce0a91e2dfb35169d176bfe6bea63_JaffaCakes118.exe
-
Size
21KB
-
MD5
2b7ce0a91e2dfb35169d176bfe6bea63
-
SHA1
64fb65731e316d00a5005d5035a95d48b664363f
-
SHA256
7c4370ae8d7474316c91530a9b864be303f6c7abca5e9df6067b731dafc35105
-
SHA512
abd8813fc9dc153e93859247fc88363c4ad3a988b8545df375c900fbd6b6dbdf263faf572e9638fcb9114902b4b4ff5c886b6e9e54a0d74e5563aec36026e511
-
SSDEEP
384:FBT3P7eqnVjiMUXOkJAMYhFe9lvewJd0KkvBcHRb5s/0wAxzFkqmU1kKhOYZ:FB3j5ViOkJAMEylvjd0KIqHRb5DlFkqx
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2296 2528 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2296 2528 2b7ce0a91e2dfb35169d176bfe6bea63_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2296 2528 2b7ce0a91e2dfb35169d176bfe6bea63_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2296 2528 2b7ce0a91e2dfb35169d176bfe6bea63_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2296 2528 2b7ce0a91e2dfb35169d176bfe6bea63_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b7ce0a91e2dfb35169d176bfe6bea63_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b7ce0a91e2dfb35169d176bfe6bea63_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 3962⤵
- Program crash
PID:2296
-