Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe
-
Size
162KB
-
MD5
5b27a89f962e384cd7bb798926695a2a
-
SHA1
0c4cc56dce28ab4514987c895bb1c884a07ab057
-
SHA256
f3513be9dbcf5541e427f849e6aedb0e6f9fb565f46189829396efd9a2196d69
-
SHA512
4d491302ac7a2d07885fdb0902202e5d46ba2b44745c36a92a4cf1074fc28de179899f36d40f33d0b96372f5e606cc73170cd5b93ada6b79724148018d070f88
-
SSDEEP
3072:fND/Plo5V903cbe3H/dpZ5yooZa3+vCACI4H+r0Ev38VBKlfts:ftP+5V3e3frvy6Hc8rcfa
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4392 3272 WerFault.exe 5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exepid process 3272 5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe 3272 5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe 3272 5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 3272 5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 21042⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3272 -ip 32721⤵PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84