Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 00:22
Static task
static1
Behavioral task
behavioral1
Sample
65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe
-
Size
175KB
-
MD5
65675cb4be666d32e4c3acc463a01ca9
-
SHA1
7569ad61222cf801a4eb1e72db6bdddbb39dd2a8
-
SHA256
2ddc92cc96ea02e999b5faa1569298929fd4e3b03ce0b05e80d6c14f28a689a9
-
SHA512
f05951fc19c4dc585e92c02d8e73304378c214d95bcb071c2f80924792818803044dbf510e73a2fb61ff3760eb28af2e38e41a62202d395057266a74fcf97ada
-
SSDEEP
3072:w6aWdDY8qONKMY0llXF+mLRBFHPZV4i1J0fbyBvEVwOzAfN8kEfnkJB5S0w:w6awDY8qOBllVHLRBFvtkXeO+o6u
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2296-2-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1724-13-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1724-11-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2516-77-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2296-79-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2296-178-0x0000000000400000-0x000000000046E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1724 2296 65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe 28 PID 2296 wrote to memory of 1724 2296 65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe 28 PID 2296 wrote to memory of 1724 2296 65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe 28 PID 2296 wrote to memory of 1724 2296 65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe 28 PID 2296 wrote to memory of 2516 2296 65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2516 2296 65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2516 2296 65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2516 2296 65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\65675cb4be666d32e4c3acc463a01ca9_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5aebec0014f138ac2778b5f50abec86a9
SHA12f0dc33fac5a395c2a1701ee52907208b1b0232d
SHA256c2124d665741f656bd47ffdd1de0409b53b3eb484be2aae1a0cb64808c195c3b
SHA512f35eb015c52ba9b79d9730235aecc3137ec468d45e0b81938b80a2d7a15da3f4a356ea09e9ccc7fe36778031542e8fe9eb73bea8283710122cad842839961634
-
Filesize
1KB
MD52f6b188ac496a4dd65a88d4ec825e1c4
SHA1615805000f65c726cb0fd74a1f29e25522463062
SHA256e3e5c5e15beabc3bab421e681033b155e987b4e5d01ceb388e608a34ccfae3b0
SHA512c4051ca6d36939150eed115eb866984d3d3428a902881e18b504946cbb3f3a310e677ba01500a78282a9724cd7d0a1f22898f5f597a38a46651f954eb92bafe2
-
Filesize
996B
MD5278663ccbfff120dcdca4d92cbfd4b2b
SHA179f8c165d9661185b2affd3f5cefcca8f4e4156d
SHA256875fd9d7633262941835d1aabbafd9a836e0f2167b2412c6e2f2a6284178ea14
SHA512b04559bffd585f086dee0f32cfb5e661f41edab6dd73acbf5f7d82c720aae39b23e373dccdffbdb2571032c06652f66fa562855b8b2a9482b7afd378845c0a7c