Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
47a46baddee728638007fb9b87765fc6
-
SHA1
64542ae465b6286728bfb6c1072a53ad65ed1032
-
SHA256
8de9c95b66842e4126a0e01f3ac23d0657ecb0d1a087d5f52f83c7f5149a387f
-
SHA512
6865b7ae50392ef70d333fed9e8955d4c601fffb99dbce3206ecfccee4ecd0fe7e181b3e4ae6f0b114096213751d52cddc831dad4fadfff97a10be5c0e987b6d
-
SSDEEP
12288:TLkcoxg7v3qnC11ErwIhh0F4qwUgUny4QUt0ZuQyGBu5wIC/XVaWY8vs7QdLUFre:nfmMv6Ckr7Mny4Qw00QTIUX7dUFre
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 824 set thread context of 2660 824 47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 824 wrote to memory of 2660 824 47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe 30 PID 824 wrote to memory of 2660 824 47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe 30 PID 824 wrote to memory of 2660 824 47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe 30 PID 824 wrote to memory of 2660 824 47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe 30 PID 824 wrote to memory of 2660 824 47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe 30 PID 824 wrote to memory of 2660 824 47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2684 2660 47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2684 2660 47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2684 2660 47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2684 2660 47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2844 2684 net.exe 33 PID 2684 wrote to memory of 2844 2684 net.exe 33 PID 2684 wrote to memory of 2844 2684 net.exe 33 PID 2684 wrote to memory of 2844 2684 net.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\47a46baddee728638007fb9b87765fc6_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2844
-
-
-