Analysis

  • max time kernel
    133s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 18:04

General

  • Target

    2d501d5aeb269dd5a6a7d471cb744260_JaffaCakes118.exe

  • Size

    340KB

  • MD5

    2d501d5aeb269dd5a6a7d471cb744260

  • SHA1

    361268f4bdd03a10b51a8f0d82a60bf1547c48da

  • SHA256

    fad372d90298a3d31f9a77d6b5280e93b63f08e78a1211a6dd8c142bf2e0fee9

  • SHA512

    c50ba2a308f204ded47429b7630229f382db20e81730c428c24625875cadeab03af0e263dd19964ee6d6e423afa3398c932fee29ebc7f46aba3f0cbae4a82f03

  • SSDEEP

    6144:gyHFZlxwyXzbqSY1qYXMwQe5n5sHFZlx55:lHFZlxwA+jhcvHFZlx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d501d5aeb269dd5a6a7d471cb744260_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d501d5aeb269dd5a6a7d471cb744260_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\eqs6D15.tmp
      "C:\Users\Admin\AppData\Local\Temp\2d501d5aeb269dd5a6a7d471cb744260_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

    Filesize

    291KB

    MD5

    95985cda956aa1a8028c1375b75a765b

    SHA1

    76d9372529355e9407e19db39939153629fc11e9

    SHA256

    4c928176f6e82ebacf12101766418389e511e765613c049fa2d0ec587e305105

    SHA512

    25fb597980911e28b94e84cd0273884f2776dd6d3572b3ed7c252bafd43ce8beedc0b86899e7cdf8918598b7a5a9c96736d38caa39b802cc4ac2956335b0c5fc

  • C:\Program Files (x86)\Common Files\microsoft shared\DW\RCXBE01.tmp

    Filesize

    14KB

    MD5

    03e53e4182e59a6979f47e59ad3ff01a

    SHA1

    dd72535d2e3e057e233445e9c7c42835a90b1972

    SHA256

    ca63ab5bf66edff6463c93dab0c454f66a12d25697bd2e19054586c95191df46

    SHA512

    6c2d70bfb885a5352bb5e775c28cdcba6ea23d3f255cecf32773cc4d26746b826fd880e51ff7582f88af9c6e94dee283f1f152defdec592ba0548197728c6657

  • C:\Program Files\7-Zip\7zFM.exe

    Filesize

    942KB

    MD5

    3a1a023908868f55050839fa8797fe02

    SHA1

    797e8b5cf03f9dea2f3545c065ce34e129268338

    SHA256

    d8f6e4bbb86c18116e40b93619949f6bd06860ffc3eda2f81f8420bd365f25f0

    SHA512

    aed00a0f2a185305952546d1fbd1280af64938aa8a233ffe6c8f6f02d646b7bc59e81952bd183f9014cfec5b6e892fc55c7cfe7ba1e25162ba8aebec3ec5c045

  • C:\Users\Admin\AppData\Local\Temp\eqs6D15.tmp

    Filesize

    236KB

    MD5

    60cb22b097bca43978ad7205b1db8f81

    SHA1

    2db323e1808a6517bda6dc08652034271a91c4bb

    SHA256

    4e917728154f66b54f9f3c85030d9964c62fb44de38973a6c81cd84f449d9e67

    SHA512

    98da0aa1f5957f2d986f168966fdefd934068f3ff66577a1c877355f9baec45621d4b4712dc9fe5950027cf9f3891421793d56d4c2352ce4f502f701e57dd9b2