Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 08:54
Static task
static1
Behavioral task
behavioral1
Sample
45210bea4ff06557ebc0b8183e62b3c6_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
45210bea4ff06557ebc0b8183e62b3c6_JaffaCakes118.exe
-
Size
330KB
-
MD5
45210bea4ff06557ebc0b8183e62b3c6
-
SHA1
7ad878576b86b4f40b3acf2f75b2adae46e90a4d
-
SHA256
66fe0483c998b8fefe4c7a00f474ff5f8714aff6204c58d247ae7d6cc708edf6
-
SHA512
37baf376a98b4265b535287e8c3041c57c9ea0af63b1daaecd172eea165ffef0b96ed9f15c839440e76af4a7d503d23b7e7d32992b647b37414b24037f161b35
-
SSDEEP
6144:F0K3AcDDyHNxf2fjNpBwx8v3fKBWZezxR68v1P36LIRvBrzQirhSXNyQ:F0K1m+fjjpv3fKKetR68oIRdzjaNf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2844 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2844 2732 45210bea4ff06557ebc0b8183e62b3c6_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2844 2732 45210bea4ff06557ebc0b8183e62b3c6_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2844 2732 45210bea4ff06557ebc0b8183e62b3c6_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2844 2732 45210bea4ff06557ebc0b8183e62b3c6_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2876 2844 cmd.exe 32 PID 2844 wrote to memory of 2876 2844 cmd.exe 32 PID 2844 wrote to memory of 2876 2844 cmd.exe 32 PID 2844 wrote to memory of 2876 2844 cmd.exe 32 PID 2844 wrote to memory of 2868 2844 cmd.exe 33 PID 2844 wrote to memory of 2868 2844 cmd.exe 33 PID 2844 wrote to memory of 2868 2844 cmd.exe 33 PID 2844 wrote to memory of 2868 2844 cmd.exe 33 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2876 attrib.exe 2868 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45210bea4ff06557ebc0b8183e62b3c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\45210bea4ff06557ebc0b8183e62b3c6_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\CRASHR~1\2932TM~1.BAT2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Local\Temp\45210bea4ff06557ebc0b8183e62b3c6_JaffaCakes118.exe"3⤵
- Views/modifies file attributes
PID:2876
-
-
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Crash Reports\2932.tmp.bat"3⤵
- Views/modifies file attributes
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506B
MD55ed0458b7cc7ef21d4f7d6c29d2f07f7
SHA1a5e355578cde9839c1f098d23f599524a7350753
SHA25655c8ce7f097a0a0902f9ae73d54d13da319ff28bf088721c1f08310932f51ff2
SHA512e049d3b6d05fbbf4262b93fde40d1db3f8c7a2b0e2470af2371ccda7d7ea196bcc73b582b5c89e26043dd8a7c0e376446d56cfd45248ed59ddf0702bc5be71d4