Analysis
-
max time kernel
142s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 21:03
Static task
static1
Behavioral task
behavioral1
Sample
713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe
-
Size
160KB
-
MD5
713a30034cb5e0e02e5c31b6518c35b5
-
SHA1
31c678958e11abc832622206b11638592398ba06
-
SHA256
e0c7d9266704b8c025a245954c2461e3bece5f135ddc7e720262ca75093b3bff
-
SHA512
8feb5952656f24c32870eb4da240f86452e036393aade341f77704c4cb129c22006f72fbdfde79fa3c1bc1acc704956745753519b97acf3a69870fba8f40c2e4
-
SSDEEP
3072:mQ5M+z7y60Z9Z0uUczAAF8J0Hv87y8E0QaA6Rubdk0ISjEimQgGnD6/6sOEWih:mQW+CNZ0tcz3cN5FRcjIfimQgydsOQh
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2112-2-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2372-4-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2372-5-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2372-7-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2112-14-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/1476-75-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2112-77-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2112-164-0x0000000000400000-0x000000000043C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2372 2112 713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe 29 PID 2112 wrote to memory of 2372 2112 713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe 29 PID 2112 wrote to memory of 2372 2112 713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe 29 PID 2112 wrote to memory of 2372 2112 713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe 29 PID 2112 wrote to memory of 1476 2112 713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe 31 PID 2112 wrote to memory of 1476 2112 713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe 31 PID 2112 wrote to memory of 1476 2112 713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe 31 PID 2112 wrote to memory of 1476 2112 713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\713a30034cb5e0e02e5c31b6518c35b5_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c5c3ed56423a6d36db3512aa6b7aecfb
SHA1c65084bb06fb69d8c88a5a190fd4f9b1f28dc1ab
SHA256bc50976133150f3ceb1aa635476dc1a85366afbf937527fc625dd44674d58d81
SHA512bef0b0b45db0366ab317bb2a418fe4fa216fac050a2ba55579c0922e18191fac6edffdd724930df80c5311c9b6076474c0d7729f97646bc24fe37610fe440272
-
Filesize
600B
MD5e1d3428135d863c526820c7e3d506109
SHA1f6269dacb2e7819de38b175ead9c851d398ce258
SHA256dc3c67dd33857af85688b8a073ddf22cede209e8f5bab6caf5ca2d79ad2a6a6f
SHA5123acae232d1371b9220e250c96dccbb71f8e8aaf17fff40415378ff7802fa53fb05d377c129c914a58499566fb7b0608fee25d241752f927cddc91cfe13a991c8
-
Filesize
996B
MD54ce6f6e2c72dfd2af7889518dfa4fa8e
SHA1796ede545103ec726b5b8cef6ce3d225ce1bddec
SHA2569fbc25cb5d8123c18f1ae210a320944cc2ae49b5fad05385647a0c8f9269a346
SHA51288055f14b44492d436d652487db058d7a2a2cd43d17234bd7d49936910fafba3e52c74747fe52b26eee9522208ff369d02d070c18830fd4bb542e15ad94fabd0