Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 03:22
Behavioral task
behavioral1
Sample
3ffe3be7574e927262b1513e5b6f9dd1_JaffaCakes118.exe
Resource
win7-20240705-en
5 signatures
150 seconds
General
-
Target
3ffe3be7574e927262b1513e5b6f9dd1_JaffaCakes118.exe
-
Size
274KB
-
MD5
3ffe3be7574e927262b1513e5b6f9dd1
-
SHA1
f00850e90557026b7a0dbf3483e9dc4ee618e9ed
-
SHA256
007fd7b538b167a2374cf70f10f12e21ba02e47c5457b0f44c8c7f2f28e7f47b
-
SHA512
506c137ce6363563db60c258fd78058155c777d8eaf24db6c0b11cde71510996fecb608da8448b457dcb541454b190d9af77898add6484575f00a7b781fe6108
-
SSDEEP
6144:4MMQExY3fKNPdYPGIinCukclwF7uLtYUKG8VeI8e5:dMZxY3fcdQinFlAqfKG8YIn
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1072-0-0x0000000000400000-0x00000000004B0000-memory.dmp upx behavioral1/memory/1072-2-0x0000000000400000-0x00000000004B0000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1072-2-0x0000000000400000-0x00000000004B0000-memory.dmp autoit_exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1072 3ffe3be7574e927262b1513e5b6f9dd1_JaffaCakes118.exe 1072 3ffe3be7574e927262b1513e5b6f9dd1_JaffaCakes118.exe 1072 3ffe3be7574e927262b1513e5b6f9dd1_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1072 3ffe3be7574e927262b1513e5b6f9dd1_JaffaCakes118.exe 1072 3ffe3be7574e927262b1513e5b6f9dd1_JaffaCakes118.exe 1072 3ffe3be7574e927262b1513e5b6f9dd1_JaffaCakes118.exe