Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
3a9bf1de21767a68246e95d1796e4491_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3a9bf1de21767a68246e95d1796e4491_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3a9bf1de21767a68246e95d1796e4491_JaffaCakes118.exe
-
Size
22KB
-
MD5
3a9bf1de21767a68246e95d1796e4491
-
SHA1
34de719c444993f65687a4eeecc8dde7b9f89115
-
SHA256
49c722e148730cdae130f7357f2a5b4df613bd1ff455247f0c8bc0798e35548a
-
SHA512
843886af9cd6b0c18de2f090499491faa33966ec7e1185a7a104832598b1747835868d0818a866ad8170da16102fe9c52f1d2f1a9d6e99d79b42aa79f11d2bf6
-
SSDEEP
384:9b5hBj4gBA6AJWo1IP2QsokMl54K/rv2EUD/Jy8r6:9b5UglAIFeATz/CEI/Ja
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1032 netmon.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetMon = "C:\\Windows\\netmon.exe" 3a9bf1de21767a68246e95d1796e4491_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetMon = "C:\\Windows\\netmon.exe" netmon.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\netmon.exe netmon.exe File opened for modification C:\Windows\netmon.exe netmon.exe File opened for modification C:\Windows\nji2.tmp netmon.exe File opened for modification C:\Windows\msi2.tmp netmon.exe File opened for modification C:\Windows\xjwu2.tmp netmon.exe File created C:\Windows\netmon.exe 3a9bf1de21767a68246e95d1796e4491_JaffaCakes118.exe File opened for modification C:\Windows\netmon.exe 3a9bf1de21767a68246e95d1796e4491_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3452 wrote to memory of 1032 3452 3a9bf1de21767a68246e95d1796e4491_JaffaCakes118.exe 84 PID 3452 wrote to memory of 1032 3452 3a9bf1de21767a68246e95d1796e4491_JaffaCakes118.exe 84 PID 3452 wrote to memory of 1032 3452 3a9bf1de21767a68246e95d1796e4491_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a9bf1de21767a68246e95d1796e4491_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a9bf1de21767a68246e95d1796e4491_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\netmon.exeC:\Windows\netmon.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD53a9bf1de21767a68246e95d1796e4491
SHA134de719c444993f65687a4eeecc8dde7b9f89115
SHA25649c722e148730cdae130f7357f2a5b4df613bd1ff455247f0c8bc0798e35548a
SHA512843886af9cd6b0c18de2f090499491faa33966ec7e1185a7a104832598b1747835868d0818a866ad8170da16102fe9c52f1d2f1a9d6e99d79b42aa79f11d2bf6
-
Filesize
313B
MD506accebdd3b9880258f650e203ce7d31
SHA1292c9eedcc6228cc733fee014cdf31c6b9d54941
SHA256ea66edd359b4a1669d2d9c98ca1edbd480addf5c2fd53597fdfa978c2892d5a3
SHA5127f5170118322c15631d1ca9af0d1ac91e9a0862c0f0d8a786d6bc8312e713c0494633ed3a07d1b6cf43709aaf549bb0d4e5e0d23b878f2a038b095bd53cac420
-
Filesize
932B
MD59da00e276bfb95cd58e27565e7d0f7cb
SHA1838db405de5400d476421de1076b7b64917936bf
SHA2562705a673b4a9897f3414e1a88f3d54f142c78945c6ef983657c25208aa4df35e
SHA512e94755db1d9edf9cfb40a6c1fb1fa0c3d6ade5cdb2e99fbd8c729398b4613879bdc369daa418401e740239b65969adb992812b9c29f73c53ea4c710661006e5e
-
Filesize
1KB
MD522f6b67738177f0cf81e4a5c215072b8
SHA12c7cb5d09778fd31a9993eaec5951beb2783ac13
SHA2561226c10fd95fc4121fda9c0767c0f3c4c035b6ab979aad9b8c4585061697cf79
SHA512bb35818ccbb7b04a35e38210b665350894eca0a26ecd0b08e97403326f1ef88ef7cb415503a1be5739f47b9aa3b4fa19c8d4d35f4060c63737ed03bf8ca23076
-
Filesize
1KB
MD5161f862dbcf80f3ed6524af492d584c3
SHA163a045df098ae3c2d3764128dcf3b200a3177528
SHA256388bd4488b3b3dfa19e3e4aa54ff80fd66b57e7c529a48c467c27d27d4dd13cd
SHA51267989c3c473a93b0a346fa456ae463fbbc560cedfc9dfe9bc8f78d64088ae5ba9d91b1ee162291c7573cf496a337cc9cc0fed6abc7d68db53511c258cb018b8f