Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
3943c4ebd059ccb283e95b1242cf55de_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
3943c4ebd059ccb283e95b1242cf55de_JaffaCakes118.exe
-
Size
21KB
-
MD5
3943c4ebd059ccb283e95b1242cf55de
-
SHA1
371964ef969805cec033903804cc740d1e576691
-
SHA256
3893e8f69b20021d560c61bf5932bc166d1f0d01a9cf82a628868b8c70ab3077
-
SHA512
0fb79c253262894193985956c413992b51ecfa0464b832dc7d246d34633d823638462f7bd1dc52001522b149e55b7f524efb1dcbddf5b86ef1161b3662f01bcb
-
SSDEEP
384:EUH+W6I5Yk+mpeHYzVydJMDzR/MGc/CQUdnGergaWHf:EUe053IHuVGJEzR/Tc/CJGwgaW
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 whatismyip.akamai.com -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3943c4ebd059ccb283e95b1242cf55de_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3943c4ebd059ccb283e95b1242cf55de_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 3943c4ebd059ccb283e95b1242cf55de_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4756 3943c4ebd059ccb283e95b1242cf55de_JaffaCakes118.exe 4756 3943c4ebd059ccb283e95b1242cf55de_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD576f57d24da659bb73f3f01db9ea80deb
SHA15ba7703f422b70710fc54bc9dbc36ed5994ec130
SHA256d75d2688169831593d27b422b5365b6617732e7ed06cfb42e3c60bd333df3d12
SHA512081971824bb2a89b901f1f9e296f6c60f2ba56790fe441a829d6d16883d26b6bf666dc90c5012c7315a3b06271e512bb67b6f635d09ae347e5b994d0db931f41