Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
401567209be73eec809c43fee94bad09_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
401567209be73eec809c43fee94bad09_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
401567209be73eec809c43fee94bad09_JaffaCakes118.exe
-
Size
168KB
-
MD5
401567209be73eec809c43fee94bad09
-
SHA1
8e7fb584f8f4e36c7cecb3fa6ab6464880098af2
-
SHA256
d96e41e128a6bb1bf0d70cc04c7e415db67bbc0f239f6084d5a98556fc3c3bfa
-
SHA512
fa27ad713031fdc3a0470a3a6debaee89fb43024af28d756c22115827e28415a9c30c0662e6b08f66860aff45bc626a16515aa0f7b1b6f4bac67bdb83608cb58
-
SSDEEP
3072:J/39g5/lBmH6/sizOm3DwFIbZEExG7hCkBlclpoUt9+:J/NW31sizOSDQmccP+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 401567209be73eec809c43fee94bad09_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2820-1-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2712-4-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2820-71-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2292-73-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2820-172-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2820-177-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2712 2820 401567209be73eec809c43fee94bad09_JaffaCakes118.exe 30 PID 2820 wrote to memory of 2712 2820 401567209be73eec809c43fee94bad09_JaffaCakes118.exe 30 PID 2820 wrote to memory of 2712 2820 401567209be73eec809c43fee94bad09_JaffaCakes118.exe 30 PID 2820 wrote to memory of 2712 2820 401567209be73eec809c43fee94bad09_JaffaCakes118.exe 30 PID 2820 wrote to memory of 2292 2820 401567209be73eec809c43fee94bad09_JaffaCakes118.exe 32 PID 2820 wrote to memory of 2292 2820 401567209be73eec809c43fee94bad09_JaffaCakes118.exe 32 PID 2820 wrote to memory of 2292 2820 401567209be73eec809c43fee94bad09_JaffaCakes118.exe 32 PID 2820 wrote to memory of 2292 2820 401567209be73eec809c43fee94bad09_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\401567209be73eec809c43fee94bad09_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\401567209be73eec809c43fee94bad09_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\401567209be73eec809c43fee94bad09_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\401567209be73eec809c43fee94bad09_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\401567209be73eec809c43fee94bad09_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\401567209be73eec809c43fee94bad09_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5c9d22990b07ee6889e2b2b2a7535b32a
SHA1dfd5065dae1dabdbeeb063e5ad0a6eeea48678ac
SHA2564aaea8d98c9af27f4bf44db6cdf019ef7b4eaeb612361c1cdbc1e60deaf86f59
SHA5129b79ebd5dc5527e7f580fd50056da9f305d1fd9b8a6d17c9ca3323eac13773acfe60567239a74c4bf1f6c59d30f59591fb4661fc49087915d9cabfbf93045de3
-
Filesize
1KB
MD586440970298a8beee00ec852386ad26b
SHA19f71a87b051f624f360c4431d70f154786aefe22
SHA2560ac631a7b2b3a2c5322dd5697e9c9b78615bfcd13715cc5a1b090967dfd46834
SHA51243c23a0b92577b1f9b5ee2652120353d66672133143ff32cd8a83a126d2ce9c4b54205ec5263a10c31c65446ce9b960ad7c1c41359e33ab26e6671cfb40d8144
-
Filesize
996B
MD5c9fd27c7c6113521141946af73d8a1cb
SHA1892a9044ad634a5d30cc72fe0cfe55064d0f6b4d
SHA256809488b7035b9f1f27e96f7385c5d58c9da3af43b62c8470101a8e75348bb7c0
SHA5122ef6ad65d651908ea431e169ec735e9809b277fcf76fff2afe84d04b8f6c4ba0a52d7e8d5f378173786d85d8abca7f4096f14940c05fbf9a2fe66cce27535d4b