Analysis
-
max time kernel
122s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
5d9ebcd17f1e623eff997c7159703921_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
5d9ebcd17f1e623eff997c7159703921_JaffaCakes118.exe
-
Size
113KB
-
MD5
5d9ebcd17f1e623eff997c7159703921
-
SHA1
dd6a8db8ec5c99a354ef8bb74a4640cc4d2b731b
-
SHA256
4c4109d5f3cba6e9eaa9009150f7ec6ef1fd990870b1bb0722a8d6758e97e8c5
-
SHA512
7f25a626083475084b9968abf3c7eff5990898b9eca108edf894417cefbf498d9d3c4bfca15682debf11dfd70cc461f1aba73ef2d2cb707e861c2607b8224e7f
-
SSDEEP
3072:N8uzF3g1Wu7utuxusuWu2OnBQlbGGWaSbxDTYUWR:2gF3MzOAGGxSbxDTYnR
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 whatismyip.com -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2476 5d9ebcd17f1e623eff997c7159703921_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2476 5d9ebcd17f1e623eff997c7159703921_JaffaCakes118.exe