Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
32630019e867d0b4dde3acfc63b6be4f_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
32630019e867d0b4dde3acfc63b6be4f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
32630019e867d0b4dde3acfc63b6be4f_JaffaCakes118.dll
-
Size
3.4MB
-
MD5
32630019e867d0b4dde3acfc63b6be4f
-
SHA1
f0616875f463ed291746cd8d8aab764620b5f490
-
SHA256
61b9898838e4963292006d0a1e1719dbf164c83071f0af412140eb8273f5e0d4
-
SHA512
53f502f2df987f0e0ace5260bfa2e554b88bb304c598ffa925b4c5ba1521912697965e5e0b425e09f37bf1aa919e86637d141114f1a54bfbb80efd9cf1886594
-
SSDEEP
49152:s3974/ASayWOGB41+t3CN0rp5nPYThpCfV:841+t3Cqrp5PE8fV
Malware Config
Signatures
-
UnicornStealer
UnicornStealer is a modular infostealer written in C++.
-
Unicorn Stealer payload 16 IoCs
resource yara_rule behavioral2/memory/5036-8-0x0000000016730000-0x0000000016875000-memory.dmp unicorn behavioral2/memory/2600-10-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-13-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-14-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-21-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-19-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-16-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-17-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-23-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-25-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-26-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-39-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-52-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-61-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-62-0x0000000000400000-0x0000000000532000-memory.dmp unicorn behavioral2/memory/2600-66-0x0000000000400000-0x0000000000532000-memory.dmp unicorn -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3316 rundll32.exe 5036 svchost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe 2600 dllhost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5036 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3316 rundll32.exe 2600 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 3316 1460 rundll32.exe 82 PID 1460 wrote to memory of 3316 1460 rundll32.exe 82 PID 1460 wrote to memory of 3316 1460 rundll32.exe 82 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84 PID 3316 wrote to memory of 5036 3316 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32630019e867d0b4dde3acfc63b6be4f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32630019e867d0b4dde3acfc63b6be4f_JaffaCakes118.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5036 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357KB
MD5d493870c484d52049a1ce89025a4a7a1
SHA1a31919cda1dc5470d5b469e87132296c7afc4a67
SHA256ccf95052f4ba9e107e019f3ebe826b2476afc5281ab5e16dec9801d063ea4da9
SHA51246e415deb4907e0074d378b1626526deeff9668cd37f6d33693087c0ac9af26b6300b67b34a9724ec165b25baf0c1d60464d6af938d0f18cdd0516c8b05222ef