Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe
-
Size
189KB
-
MD5
474e146922b8df4c3f5038bcf1a34b1a
-
SHA1
b02d35ebfce1a5dafa68db396113090de228f843
-
SHA256
4ac262c44085af2e001f4c16d80dfa6bc9b7437c19044748304014b4ce4c25d0
-
SHA512
62e78a10b708900c8aad13d4657e8e5a8b2b5f2843b08c626a6538952094774d23fa8c4563ebf89db039ab802a154cc7779e42b7e5cd7b60c2948d0e9cc5e2cb
-
SSDEEP
3072:O23rRquoIPr1n925uyaJKRfUXdHtnxvfgYu4VndJR0OAl8cP1/D8ZphO+K:zVqu5Px925uPkRfUXdHtnOt4VndBo8Ai
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2708-1-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2708-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2780-11-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2708-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2352-121-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2352-122-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2708-231-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2708-236-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2780 2708 474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2780 2708 474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2780 2708 474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2780 2708 474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2352 2708 474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2352 2708 474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2352 2708 474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2352 2708 474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe startC:\Program Files (x86)\LP\4420\97B.exe%C:\Program Files (x86)\LP\44202⤵PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\474e146922b8df4c3f5038bcf1a34b1a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\03D37\95744.exe%C:\Users\Admin\AppData\Roaming\03D372⤵PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD559df0f44b959cee7c9fa357d72465ce2
SHA1546bae03739168b89479bfca15cd9bc5c1514638
SHA256b2342d34a74fe755b4be8be8d159797dd6993194b65ddb228a194f6d07585bde
SHA51249394de6c6d39ce62ca45b971873a595e048d451f6ee87d9b9b0b949881bc9d037e21adeb958e2d9d9df8c84b1e3e073d0eabf59fef831ae503828caca006efd
-
Filesize
600B
MD535154b28097424b52fba748af8e034c1
SHA145ac9eb2b93c126034fa3aa7734a4ac67bdee3c2
SHA256e215a9f0282eaf49363835070e7901b7fd368eba3ddf03dc07c17cc74c2a785a
SHA512be655e26b5d159354dd1d1238707b13eeb9622fd4f2382f141e8d60ee2da411cd3d389274d080825dc40115585ef59254493542bb148fa80c46b28d9ddc25eb2
-
Filesize
1KB
MD5a40d5d984203664665ec2f3de6b706e7
SHA10fc64ed1e71f8be4fe966989eb9c79922258040e
SHA2565b6095ae5811b47a2e58ae7ebded1936bbfc55dc76d0ac03a873716932f14465
SHA512ceca03b39dd142497c84e7dc8aae0757950b0f1f4dc73fe6f2756049e2316723a1b30e11106d547e0bdeefc720d7a600b780fcf6b7f9c44bd73040aff057dc7e
-
Filesize
1KB
MD548bfd8b67107a5ab1117fbe3f60da966
SHA149559a5be52e587d40a9df578ee6f2ff8c5ea7e0
SHA256b42b3126b682e9550339b9d961d0411d2acf3796f7fb0da30f321632e1ed7aa0
SHA512e83aee7db4432fd60c5b066e48e0b64a2cedcee991df2c2eb0f8e9895b41ffdfb5dfe9e11baed101c4cdf0369851f47cad48d894e22ff8c1e4a2147da53b20ad