Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
32630019e867d0b4dde3acfc63b6be4f_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
32630019e867d0b4dde3acfc63b6be4f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
32630019e867d0b4dde3acfc63b6be4f_JaffaCakes118.dll
-
Size
3.4MB
-
MD5
32630019e867d0b4dde3acfc63b6be4f
-
SHA1
f0616875f463ed291746cd8d8aab764620b5f490
-
SHA256
61b9898838e4963292006d0a1e1719dbf164c83071f0af412140eb8273f5e0d4
-
SHA512
53f502f2df987f0e0ace5260bfa2e554b88bb304c598ffa925b4c5ba1521912697965e5e0b425e09f37bf1aa919e86637d141114f1a54bfbb80efd9cf1886594
-
SSDEEP
49152:s3974/ASayWOGB41+t3CN0rp5nPYThpCfV:841+t3Cqrp5PE8fV
Malware Config
Signatures
-
UnicornStealer
UnicornStealer is a modular infostealer written in C++.
-
Unicorn Stealer payload 23 IoCs
resource yara_rule behavioral1/memory/2076-7-0x00000000160E0000-0x0000000016225000-memory.dmp unicorn behavioral1/memory/2676-9-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-10-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-14-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-19-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-18-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-16-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-15-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-21-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-25-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-23-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-27-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-38-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-33-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-30-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-41-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-55-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-57-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-59-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-61-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-62-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-65-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral1/memory/2676-67-0x0000000000400000-0x0000000000532000-memory.dmp unicorn -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1960 rundll32.exe 2076 svchost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe 2676 dllhost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2076 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1960 rundll32.exe 2676 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1960 2392 rundll32.exe 30 PID 2392 wrote to memory of 1960 2392 rundll32.exe 30 PID 2392 wrote to memory of 1960 2392 rundll32.exe 30 PID 2392 wrote to memory of 1960 2392 rundll32.exe 30 PID 2392 wrote to memory of 1960 2392 rundll32.exe 30 PID 2392 wrote to memory of 1960 2392 rundll32.exe 30 PID 2392 wrote to memory of 1960 2392 rundll32.exe 30 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 1960 wrote to memory of 2076 1960 rundll32.exe 31 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33 PID 2076 wrote to memory of 2676 2076 svchost.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32630019e867d0b4dde3acfc63b6be4f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32630019e867d0b4dde3acfc63b6be4f_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357KB
MD5d493870c484d52049a1ce89025a4a7a1
SHA1a31919cda1dc5470d5b469e87132296c7afc4a67
SHA256ccf95052f4ba9e107e019f3ebe826b2476afc5281ab5e16dec9801d063ea4da9
SHA51246e415deb4907e0074d378b1626526deeff9668cd37f6d33693087c0ac9af26b6300b67b34a9724ec165b25baf0c1d60464d6af938d0f18cdd0516c8b05222ef