Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 22:47
Behavioral task
behavioral1
Sample
651a228500a37b61699cfd998b939c9b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
651a228500a37b61699cfd998b939c9b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
651a228500a37b61699cfd998b939c9b_JaffaCakes118.exe
-
Size
375KB
-
MD5
651a228500a37b61699cfd998b939c9b
-
SHA1
25c44e8fda19fa7a94554468c8bd430eb463e7d6
-
SHA256
b0bce718c58cbe203ea8ddc06d3401da81f6b800848181345272d47fc8fbe0ee
-
SHA512
5b9b0f807c6f416425519e624dc8bd356c66a9c10f0a256322900af92efbebd42c3b7f39d98d9019d9950aad9e17fd72fe2ef04b18205d493b261496e1b17f39
-
SSDEEP
6144:D7IoydhrM5LrghRCB7/NUHF6hGRJNOvb2wRqr6JsM/AX/r+r5PGPkEz7UJZp:X1rgex/NUl6A41RqksMZr5PGPBU
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2468-0-0x0000000000400000-0x00000000004E6000-memory.dmp upx behavioral1/memory/2468-1-0x0000000000400000-0x00000000004E6000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PromoReg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\651a228500a37b61699cfd998b939c9b_JaffaCakes118.exe" 651a228500a37b61699cfd998b939c9b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2468 651a228500a37b61699cfd998b939c9b_JaffaCakes118.exe