Analysis

  • max time kernel
    93s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-07-2024 06:52

General

  • Target

    40a00ba5605df8bbaa13cdba529de522_JaffaCakes118.exe

  • Size

    81KB

  • MD5

    40a00ba5605df8bbaa13cdba529de522

  • SHA1

    3c00223dcbafd95a9c548b9a98a9e615aef2e4f8

  • SHA256

    e26bc00aac2d0dcb538d75f695917236f114f91b5a99ace5a838aec1661e5a7f

  • SHA512

    266ae8be2a85eca8c3c26654fc749bc9b298e83763a89fa63a0aa658b3d4655dc343e759481f3c2da8e3bf3fb14a33191e6d4076a0e71676236b85af50d964ea

  • SSDEEP

    1536:h9bx7QcYZ+7z90ueaGs/uHgrlcP4H7Ey66dkgrD9j0nfLZN4WZyhXaXK1o:rdAGz90ueaGs/uHAcPLykgrxq9IaXK1o

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    motorolka

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40a00ba5605df8bbaa13cdba529de522_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\40a00ba5605df8bbaa13cdba529de522_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3000-0-0x00007FFD07B75000-0x00007FFD07B76000-memory.dmp

    Filesize

    4KB

  • memory/3000-1-0x000000001B220000-0x000000001B2C6000-memory.dmp

    Filesize

    664KB

  • memory/3000-2-0x00007FFD078C0000-0x00007FFD08261000-memory.dmp

    Filesize

    9.6MB

  • memory/3000-3-0x000000001B7A0000-0x000000001BC6E000-memory.dmp

    Filesize

    4.8MB

  • memory/3000-4-0x000000001BD90000-0x000000001BE2C000-memory.dmp

    Filesize

    624KB

  • memory/3000-5-0x00007FFD078C0000-0x00007FFD08261000-memory.dmp

    Filesize

    9.6MB

  • memory/3000-6-0x0000000000E60000-0x0000000000E68000-memory.dmp

    Filesize

    32KB

  • memory/3000-7-0x000000001BFF0000-0x000000001C03C000-memory.dmp

    Filesize

    304KB

  • memory/3000-8-0x00007FFD078C0000-0x00007FFD08261000-memory.dmp

    Filesize

    9.6MB

  • memory/3000-9-0x000000001E630000-0x000000001E692000-memory.dmp

    Filesize

    392KB

  • memory/3000-10-0x000000001ED00000-0x000000001F00E000-memory.dmp

    Filesize

    3.1MB

  • memory/3000-11-0x00007FFD078C0000-0x00007FFD08261000-memory.dmp

    Filesize

    9.6MB

  • memory/3000-12-0x00007FFD078C0000-0x00007FFD08261000-memory.dmp

    Filesize

    9.6MB

  • memory/3000-14-0x00007FFD078C0000-0x00007FFD08261000-memory.dmp

    Filesize

    9.6MB