Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2024 19:23
Behavioral task
behavioral1
Sample
546d2ae4811359ac99f519ddc36a7b34_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
546d2ae4811359ac99f519ddc36a7b34_JaffaCakes118.exe
-
Size
358KB
-
MD5
546d2ae4811359ac99f519ddc36a7b34
-
SHA1
d02964232311c54e86d5ad95d65c0e7e3b87d18f
-
SHA256
58db15d4b45db176d80ad7cc21b544dcec55d89543a50f1649b4eb9cd7194229
-
SHA512
034fd0c727ea190a4d539b2f5798bd0cd7b82929ee47e88edb112630633d5acac8dcd08a8598008619af1aa0d1e82330d15988e34e273f2f4978f9f3965a00cf
-
SSDEEP
6144:fH8OjBd3ICtA2GGfAcghy142UCsjMmvJgMi1SYyn8SjuG:bjzFzzYcM83TmahCnjh
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4880 546d2ae4811359ac99f519ddc36a7b34_JaffaCakes118.exe 4880 546d2ae4811359ac99f519ddc36a7b34_JaffaCakes118.exe 4880 546d2ae4811359ac99f519ddc36a7b34_JaffaCakes118.exe 4880 546d2ae4811359ac99f519ddc36a7b34_JaffaCakes118.exe 4880 546d2ae4811359ac99f519ddc36a7b34_JaffaCakes118.exe 4880 546d2ae4811359ac99f519ddc36a7b34_JaffaCakes118.exe 4880 546d2ae4811359ac99f519ddc36a7b34_JaffaCakes118.exe 4880 546d2ae4811359ac99f519ddc36a7b34_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4880 546d2ae4811359ac99f519ddc36a7b34_JaffaCakes118.exe