Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 14:49
Behavioral task
behavioral1
Sample
3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe
-
Size
335KB
-
MD5
3992429efd7fb33c5a8fb2cd745350c5
-
SHA1
96536fdc2eed3f3f22c98de48c08fdb2f0f06da9
-
SHA256
5b1aa5bc22ea45b1bb956940130035ad86f3683ab32ef17140da8a7487b2c1f0
-
SHA512
42b02a4f00bdebf9c43710c62ab97927427e568e27d10c36880aa5b60da6988593c009145c92a92cf0b0da103cfb46e6cbcf35b8648b52c6a54dee92e11c335c
-
SSDEEP
6144:VxlJxlljWo073ytJHTxL9qTj5GHnRnZETsSVZn4HteGieIoAHm2rk1I6gn+:Vzietd9L9nRnaxrOeGcoV4+G+
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2632-0-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral1/memory/2632-9-0x0000000000400000-0x0000000000580000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2632 set thread context of 316 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe 31 PID 2632 set thread context of 0 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2632 wrote to memory of 316 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe 31 PID 2632 wrote to memory of 316 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe 31 PID 2632 wrote to memory of 316 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe 31 PID 2632 wrote to memory of 316 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe 31 PID 2632 wrote to memory of 316 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe 31 PID 2632 wrote to memory of 316 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe 31 PID 2632 wrote to memory of 316 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe 31 PID 2632 wrote to memory of 316 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe 31 PID 2632 wrote to memory of 316 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe 31 PID 2632 wrote to memory of 316 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe 31 PID 2632 wrote to memory of 0 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe PID 2632 wrote to memory of 0 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe PID 2632 wrote to memory of 0 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe PID 2632 wrote to memory of 0 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe PID 2632 wrote to memory of 0 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe PID 2632 wrote to memory of 0 2632 3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3992429efd7fb33c5a8fb2cd745350c5_JaffaCakes118.exe"2⤵PID:316
-