Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe
-
Size
187KB
-
MD5
37ccfdbebe357171e6a4be7e7760590f
-
SHA1
00f44376824fe298c6b3fcc06b46f6dec3898836
-
SHA256
b877a3697e6559fa0e317a6480dbdd73d955c42f5f80eda1aafa159ccf030c0b
-
SHA512
e4edbade58d0cf44347238f3daf1512f1fd27c554f3808da4f15b07e3cb7532b2e0bd34c787d251176dd32c9408a75632d37e5aadd957ab4b1b456cc0a94870f
-
SSDEEP
3072:6Fh4IoSEIj1EGWE6GU9N46AQIKFoRnxLeFZoXNhnUau4R6BCPVybQqx6PCLLMxm:6F6IX1EGphwtWuiLnUauHoNSNLLMxm
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2552-1-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2552-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/484-11-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/484-12-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2552-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1740-127-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1740-126-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2552-240-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2552-283-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2552 wrote to memory of 484 2552 37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe 31 PID 2552 wrote to memory of 484 2552 37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe 31 PID 2552 wrote to memory of 484 2552 37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe 31 PID 2552 wrote to memory of 484 2552 37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe 31 PID 2552 wrote to memory of 1740 2552 37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe 33 PID 2552 wrote to memory of 1740 2552 37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe 33 PID 2552 wrote to memory of 1740 2552 37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe 33 PID 2552 wrote to memory of 1740 2552 37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe startC:\Program Files (x86)\LP\D539\6DB.exe%C:\Program Files (x86)\LP\D5392⤵PID:484
-
-
C:\Users\Admin\AppData\Local\Temp\37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\37ccfdbebe357171e6a4be7e7760590f_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\97E46\73ED5.exe%C:\Users\Admin\AppData\Roaming\97E462⤵PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5601fda82206ef7ec56f3db3506aec222
SHA12cce9b3c6ec7ddd4653cc5ba61aa683150407516
SHA256387add7ed21e05e17665d552a504f2dd7c493aef515c7c49de0184013b4d5855
SHA51207713f0de19305178bfd10574865b2a353c3d4975b21996487f59882fc29f4b4e279525319a387d842bf464ea5c60de3834884e7523e758c499e3429bf957d9a
-
Filesize
600B
MD519b15385e9bd439672ded34899c49f9f
SHA1faedeb30baf1e85402bcf49cf6d55bc706e30d7c
SHA2563eaba253a1b358a2024e8d0b152066dd2b3d234418b5de976c455b3f4a402eaf
SHA51212f6ec210e61f7d6ada9ed798a4a60480a2565f73d7506ae7229f68f3422b1bb913fa1849d0a987a25fd3e410f6cd41de19f2adefd87482a5887ce07d3dc8646
-
Filesize
1KB
MD5b0c08bd87e3ca0b6573ac57fbd811f37
SHA144448286e22638c285bc0ec306960ddfe0e2e766
SHA256a81e9c0d1acc5ae33d59fb0b2d45b84e451ee12aa9a92ec241f1cd308b85933b
SHA512f491eaaecb9352738658ae9e88ead320508316982a54542e6d5a0e5b19656b361f069ae775d8abe6ecfcab20bdce4a4356d891182835d0f46c953c40fc47c97f