Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 08:46
Behavioral task
behavioral1
Sample
2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe
-
Size
612KB
-
MD5
2bb36271555dc384731a184f30ad0361
-
SHA1
7f90fb02f8ea12d9cf88db7dbeab905078ab0b17
-
SHA256
409d302c26b6b825cac87a7568421531c399c7e4454ce4316f97ae6245f05804
-
SHA512
6c32c1f9e5a58fee56fc0dd7cee2ade7a826cb32ff871d9709ac9bafeb763a98ec211ec7dfcf23107454d27cc6c1dbde014291ba690a2e7e45952eaa4b88ce68
-
SSDEEP
12288:I9RhZOZMNfxkqo6pLcAKHIZ7hP576qLwkPjMj7QYrSqSgUIwT:I9RTNf5o61c8pT76qL1gYOSflT
Malware Config
Signatures
-
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/3664-24-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral2/memory/3664-23-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral2/memory/3664-27-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 25 IoCs
resource yara_rule behavioral2/memory/3164-6-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral2/memory/3164-7-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral2/memory/3164-9-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral2/memory/2544-15-0x0000000000400000-0x0000000000425000-memory.dmp Nirsoft behavioral2/memory/2544-16-0x0000000000400000-0x0000000000425000-memory.dmp Nirsoft behavioral2/memory/2544-18-0x0000000000400000-0x0000000000425000-memory.dmp Nirsoft behavioral2/memory/3664-24-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral2/memory/3664-23-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral2/memory/3664-27-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral2/memory/1208-32-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral2/memory/1208-31-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral2/memory/1208-36-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral2/memory/3404-41-0x0000000000400000-0x000000000043E000-memory.dmp Nirsoft behavioral2/memory/3404-43-0x0000000000400000-0x000000000043E000-memory.dmp Nirsoft behavioral2/memory/3404-47-0x0000000000400000-0x000000000043E000-memory.dmp Nirsoft behavioral2/memory/3404-42-0x0000000000400000-0x000000000043E000-memory.dmp Nirsoft behavioral2/memory/2572-51-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/2572-54-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3140-55-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral2/memory/3140-56-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral2/memory/3140-58-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral2/memory/224-66-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral2/memory/224-62-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral2/memory/2988-73-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral2/memory/2988-70-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3632-0-0x0000000000400000-0x00000000004AF000-memory.dmp upx behavioral2/memory/3164-3-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3164-5-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3164-6-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3164-7-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3164-9-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2544-11-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2544-14-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2544-15-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2544-16-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2544-18-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/3664-19-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3664-21-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3664-24-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3664-23-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3664-22-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3664-27-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1208-28-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1208-30-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1208-32-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1208-31-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1208-36-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3404-38-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/3404-40-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/3404-41-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/3404-43-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/3404-47-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/2572-49-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/3404-42-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/2572-50-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/2572-51-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/2572-54-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/224-59-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/224-66-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/224-62-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/224-61-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3632-60-0x0000000000400000-0x00000000004AF000-memory.dmp upx behavioral2/memory/2988-68-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2988-69-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2988-73-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2988-70-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3632-75-0x0000000000400000-0x00000000004AF000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 3632 set thread context of 3164 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 83 PID 3632 set thread context of 2544 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 85 PID 3632 set thread context of 3664 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 86 PID 3632 set thread context of 1208 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 87 PID 3632 set thread context of 3404 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 89 PID 3632 set thread context of 2572 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 90 PID 3632 set thread context of 3140 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 91 PID 3632 set thread context of 224 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 92 PID 3632 set thread context of 2988 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2544 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 2544 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2544 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe Token: SeDebugPrivilege 2572 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe Token: SeRestorePrivilege 2572 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe Token: SeBackupPrivilege 2572 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3632 wrote to memory of 3164 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 83 PID 3632 wrote to memory of 3164 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 83 PID 3632 wrote to memory of 3164 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 83 PID 3632 wrote to memory of 3164 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 83 PID 3632 wrote to memory of 3164 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 83 PID 3632 wrote to memory of 3164 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 83 PID 3632 wrote to memory of 3164 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 83 PID 3632 wrote to memory of 3164 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 83 PID 3632 wrote to memory of 2544 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 85 PID 3632 wrote to memory of 2544 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 85 PID 3632 wrote to memory of 2544 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 85 PID 3632 wrote to memory of 2544 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 85 PID 3632 wrote to memory of 2544 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 85 PID 3632 wrote to memory of 2544 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 85 PID 3632 wrote to memory of 2544 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 85 PID 3632 wrote to memory of 2544 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 85 PID 3632 wrote to memory of 3664 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 86 PID 3632 wrote to memory of 3664 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 86 PID 3632 wrote to memory of 3664 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 86 PID 3632 wrote to memory of 3664 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 86 PID 3632 wrote to memory of 3664 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 86 PID 3632 wrote to memory of 3664 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 86 PID 3632 wrote to memory of 3664 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 86 PID 3632 wrote to memory of 3664 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 86 PID 3632 wrote to memory of 1208 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 87 PID 3632 wrote to memory of 1208 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 87 PID 3632 wrote to memory of 1208 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 87 PID 3632 wrote to memory of 1208 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 87 PID 3632 wrote to memory of 1208 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 87 PID 3632 wrote to memory of 1208 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 87 PID 3632 wrote to memory of 1208 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 87 PID 3632 wrote to memory of 1208 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 87 PID 3632 wrote to memory of 3404 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 89 PID 3632 wrote to memory of 3404 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 89 PID 3632 wrote to memory of 3404 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 89 PID 3632 wrote to memory of 3404 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 89 PID 3632 wrote to memory of 3404 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 89 PID 3632 wrote to memory of 3404 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 89 PID 3632 wrote to memory of 3404 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 89 PID 3632 wrote to memory of 3404 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 89 PID 3632 wrote to memory of 2572 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 90 PID 3632 wrote to memory of 2572 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 90 PID 3632 wrote to memory of 2572 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 90 PID 3632 wrote to memory of 2572 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 90 PID 3632 wrote to memory of 2572 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 90 PID 3632 wrote to memory of 2572 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 90 PID 3632 wrote to memory of 2572 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 90 PID 3632 wrote to memory of 2572 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 90 PID 3632 wrote to memory of 3140 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 91 PID 3632 wrote to memory of 3140 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 91 PID 3632 wrote to memory of 3140 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 91 PID 3632 wrote to memory of 3140 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 91 PID 3632 wrote to memory of 3140 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 91 PID 3632 wrote to memory of 3140 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 91 PID 3632 wrote to memory of 3140 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 91 PID 3632 wrote to memory of 3140 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 91 PID 3632 wrote to memory of 3140 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 91 PID 3632 wrote to memory of 224 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 92 PID 3632 wrote to memory of 224 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 92 PID 3632 wrote to memory of 224 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 92 PID 3632 wrote to memory of 224 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 92 PID 3632 wrote to memory of 224 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 92 PID 3632 wrote to memory of 224 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 92 PID 3632 wrote to memory of 224 3632 2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe/stext "C:\Users\Admin\AppData\Local\Temp\offc.dat"2⤵PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe/stext "C:\Users\Admin\AppData\Local\Temp\mess.dat"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe/stext "C:\Users\Admin\AppData\Local\Temp\mail.dat"2⤵
- Accesses Microsoft Outlook accounts
PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe/stext "C:\Users\Admin\AppData\Local\Temp\dial.dat"2⤵PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe/stext "C:\Users\Admin\AppData\Local\Temp\chro.dat"2⤵PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe/stext "C:\Users\Admin\AppData\Local\Temp\iexp.dat"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe/stext "C:\Users\Admin\AppData\Local\Temp\ptsg.dat"2⤵PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe/stext "C:\Users\Admin\AppData\Local\Temp\ffox.dat"2⤵PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\2bb36271555dc384731a184f30ad0361_JaffaCakes118.exe/stext "C:\Users\Admin\AppData\Local\Temp\opra.dat"2⤵PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
723B
MD549f7a5322666e4439125edf0c8b35f59
SHA15e53442f2b9915d71f5cb874ffddb04e1be85ec8
SHA256b76f21060c86e1d851fe1dac626f1f9bb5b1bc42b63529b6f5050beab67c7957
SHA512b1d603cc32e8bf4adf33bd4b8863b3c6f303d1f95b499d9df4e06bbd649c1a2fa98afa3c058092bcf5fa7f82d6fc5ec8f3effafa2ed771014a68b68b6678ff9d