Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 08:07

General

  • Target

    33e95571b1c344029ab2667dff9ea482_JaffaCakes118.exe

  • Size

    289KB

  • MD5

    33e95571b1c344029ab2667dff9ea482

  • SHA1

    3bfa3597c108b8162fdff200840028673e21b11a

  • SHA256

    c94f1404620a4f0b44179f427e6496fb6e6dcfbda5e99fe7ceeee6f92a4fda1a

  • SHA512

    d505411193daf72a31ce2d9c350d1ef20f8e30d9f5b4595494a392182fe52cca2f5525103986c6ba271fb99b29de47e2100a7425711b49be2430b25fb6fb713b

  • SSDEEP

    6144:cVD+TyifQVD4stL1O+TyiNIgpxGNid5wwCgT:c8XqFjXNIIMNid5wwC

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33e95571b1c344029ab2667dff9ea482_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\33e95571b1c344029ab2667dff9ea482_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:1996

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\905c0769f9a06c95a24ddf945\patcher.exe

          Filesize

          579KB

          MD5

          c3e74ae5d3058d4572cc2f1106d5c021

          SHA1

          69b8af6ea39bd53a41a89d75f7a694190d5300b7

          SHA256

          fffc9db5295d3b7fb1570d8fe8664c4eb6214a84d5fc0d658cde813a24084785

          SHA512

          38f07d04085027fc4622316040a3ce1c531a514aac0c37aa09652e8fe87c626d30cc64d0f608a5eef70f13f2b3c6456bc775e4b564e4e8537a9089402625a069

        • memory/1996-0-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB