Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2024 21:16

General

  • Target

    616dd8445a7667aef37ec4922fc49afc_JaffaCakes118.exe

  • Size

    191KB

  • MD5

    616dd8445a7667aef37ec4922fc49afc

  • SHA1

    dd3ed9429a39620683704315491f3652717c547c

  • SHA256

    163dcf9cc993313b73d77a59c2d77546c1ee5772e238f5beb2bb9a4754b5bf66

  • SHA512

    72f1670de021ca1690ace61ee72f41ae7939a6aba89df084f625876e7712a48e9c483f2aae2838f504042b5d809d3cd85615d60dbc0bead0bf9c4d0d590e905e

  • SSDEEP

    3072:X2WwClXMPvigKs4pkuVlxF5GWp1icKAArDZz4N9GhbkrNEk1Lz8VEHL6Cn:GWwCl8PaBsyVTp0yN90QEPQL6C

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\616dd8445a7667aef37ec4922fc49afc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\616dd8445a7667aef37ec4922fc49afc_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\link.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\link.exe
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\link.exe

    Filesize

    60KB

    MD5

    4bdfdc0c9f9e015eca2e09315d855704

    SHA1

    086b913d069c643074ad056e1936f0f1d401cc3b

    SHA256

    85c4988e9e984153e20b1c0e6589aa70e824d22af8a48bb0d67f8c2bed16a709

    SHA512

    c777fc1dd64198b0af6b0dcebc38e28d5e4b61ead358621f35abe5bb5f8c4171117b89e89e91456ce749b03d72b7a4e64762d8b987d1b1c436cd51c08c3017da

  • memory/2888-9-0x000007FEF5A0E000-0x000007FEF5A0F000-memory.dmp

    Filesize

    4KB

  • memory/2888-10-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2888-11-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2888-12-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2888-13-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2888-14-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2888-15-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2888-25-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2888-26-0x000007FEF5750000-0x000007FEF60ED000-memory.dmp

    Filesize

    9.6MB