Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 05:17
Behavioral task
behavioral1
Sample
4cf061a791717614b9de855edf762a55_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
General
-
Target
4cf061a791717614b9de855edf762a55_JaffaCakes118.exe
-
Size
48KB
-
MD5
4cf061a791717614b9de855edf762a55
-
SHA1
96d9b4367c16d2cc845586d61d972780c5def793
-
SHA256
c78c1946c94582ab24923ab9b98acfc9ff9e4fd1765f11d0ce12a1f4ce2ba37c
-
SHA512
b646b7c6edd8c0e7870267c5954fe3153b43ab0ee283caf7fb262eb6872552925571bc62912a440378672c895df879f7e46d12ce6278e1e20e76bf56d859e26c
-
SSDEEP
768:3+aOeVlRcsKie17PgzJfZajwhOn9mBpAnGV14zzkWeFfM8mH/J5Nu:3+9olRTKx1rgkwh5SnU14zeAH/3Nu
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 4cf061a791717614b9de855edf762a55_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\4cf061a791717614b9de855edf762a55_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4cf061a791717614b9de855edf762a55_JaffaCakes118.exe:*:Enabled:ldrsoft" 4cf061a791717614b9de855edf762a55_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4cf061a791717614b9de855edf762a55_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1640-1-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral1/memory/1640-2-0x0000000000400000-0x0000000001456000-memory.dmp upx behavioral1/memory/1640-3-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral1/memory/1640-4-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral1/memory/1640-6-0x0000000000400000-0x0000000001456000-memory.dmp upx behavioral1/memory/1640-9-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral1/memory/1640-13-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral1/memory/1640-17-0x0000000000400000-0x000000000145A000-memory.dmp upx