Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
5d223ac341a408f79c98c6880a7230fb_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
5d223ac341a408f79c98c6880a7230fb_JaffaCakes118.exe
-
Size
220KB
-
MD5
5d223ac341a408f79c98c6880a7230fb
-
SHA1
9d5a353481fae300d59b30fee6842a3f5aff511a
-
SHA256
58b107187fc2905350106ff028750aa564f897d7b30baeb90a34e91b745fdcaa
-
SHA512
2a9a0480b80555a6e39be736e865acb3057dab050b827fa65d5a89853c701a1ad2a26e6b12e18efe4854b11856528e29a3f423aa66e77af5d844dca70c0fe12d
-
SSDEEP
6144:ayu6ITnl2O/0LsDpIZvP9ma27z2NY9B+UM:ayuFl2O/0Ls9Ih9ZD66
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 368 wrote to memory of 516 368 5d223ac341a408f79c98c6880a7230fb_JaffaCakes118.exe 84 PID 368 wrote to memory of 516 368 5d223ac341a408f79c98c6880a7230fb_JaffaCakes118.exe 84 PID 368 wrote to memory of 516 368 5d223ac341a408f79c98c6880a7230fb_JaffaCakes118.exe 84 PID 516 wrote to memory of 2928 516 cmd.exe 86 PID 516 wrote to memory of 2928 516 cmd.exe 86 PID 516 wrote to memory of 2928 516 cmd.exe 86 PID 516 wrote to memory of 2684 516 cmd.exe 87 PID 516 wrote to memory of 2684 516 cmd.exe 87 PID 516 wrote to memory of 2684 516 cmd.exe 87 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2928 attrib.exe 2684 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d223ac341a408f79c98c6880a7230fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d223ac341a408f79c98c6880a7230fb_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Adobe\FLASHP~1\NATIVE~1\A9CDTM~1.BAT2⤵
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Local\Temp\5d223ac341a408f79c98c6880a7230fb_JaffaCakes118.exe"3⤵
- Views/modifies file attributes
PID:2928
-
-
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\NativeCache\A9CD.tmp.bat"3⤵
- Views/modifies file attributes
PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
508B
MD50edb1f61f0d49520983d6ad4741c0c43
SHA17cad2f077f5c4937c68e7c843dd4204372460544
SHA2563d5812ba624df602e09b1d3c83095c24446aff381c740b035d034d8329e76ce5
SHA51247af1c6eae67b303ebcb68b9a314f617b21f734649efb807de75bb32efede9b43d1aded70a8eaf152e2fa33177f7a6ad171e6b0c178f1ee36b977646f1e8fc01