Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
59d53dd8976a59a99510718620b4c989_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
59d53dd8976a59a99510718620b4c989_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
59d53dd8976a59a99510718620b4c989_JaffaCakes118.exe
-
Size
84KB
-
MD5
59d53dd8976a59a99510718620b4c989
-
SHA1
a754279eb691ee0e76181745ab9c24363ca82358
-
SHA256
3d2594e3004f3e75bf09ac572c7bdbc6db97550a3d999eca39c47cf6ceabf0b7
-
SHA512
87a0717c1b2990992d049ddaf778ac276b83f59a84827f922889db9a325cba0fe3a575a77da3fa2d5634eed91649a1a48d41c3907c4ff368261099ea1f19a43e
-
SSDEEP
1536:GdPBD1Lq1/Ji+UiaZZBizYiE19nKZsHf0e9cH:aYHi+UiaQYlXKWce
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 59d53dd8976a59a99510718620b4c989_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 59d53dd8976a59a99510718620b4c989_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 59d53dd8976a59a99510718620b4c989_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1716 59d53dd8976a59a99510718620b4c989_JaffaCakes118.exe 1716 59d53dd8976a59a99510718620b4c989_JaffaCakes118.exe