Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 22:46

General

  • Target

    5dff76b603bb44462f446625d2a39ee7_JaffaCakes118.exe

  • Size

    49KB

  • MD5

    5dff76b603bb44462f446625d2a39ee7

  • SHA1

    43521db8576a9edfe56169def9199b8aecccddef

  • SHA256

    4b77f380fe943187e479d7b2893b18521da0f2f0ccb9067b81f38e352102bf8f

  • SHA512

    426661837e7541576fc81fd444eb25987117db964db2d14eee5c2f8e2e3a8474a27f46ea0c9984dce6d9809f4796b3399f442abc6f383b212ce662beef7734d8

  • SSDEEP

    768:Aa7JujtAKW618WFDS4STyAZ44G0GJKeq7uEET9r+v4cxfjJNut:BMe8GLTovJk7urebNu

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dff76b603bb44462f446625d2a39ee7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5dff76b603bb44462f446625d2a39ee7_JaffaCakes118.exe"
    1⤵
    • Modifies firewall policy service
    • Checks BIOS information in registry
    PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2556-1-0x0000000000400000-0x000000000145B000-memory.dmp

    Filesize

    16.4MB

  • memory/2556-0-0x0000000000400000-0x000000000145B000-memory.dmp

    Filesize

    16.4MB

  • memory/2556-2-0x0000000000400000-0x0000000001456000-memory.dmp

    Filesize

    16.3MB

  • memory/2556-3-0x0000000000400000-0x000000000145B000-memory.dmp

    Filesize

    16.4MB

  • memory/2556-4-0x0000000000400000-0x000000000145B000-memory.dmp

    Filesize

    16.4MB

  • memory/2556-5-0x0000000000400000-0x0000000001456000-memory.dmp

    Filesize

    16.3MB

  • memory/2556-9-0x0000000000400000-0x000000000145B000-memory.dmp

    Filesize

    16.4MB

  • memory/2556-13-0x0000000000400000-0x000000000145B000-memory.dmp

    Filesize

    16.4MB

  • memory/2556-17-0x0000000000400000-0x000000000145B000-memory.dmp

    Filesize

    16.4MB