Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe
-
Size
184KB
-
MD5
78269843d7380e8412a02ec977cf664a
-
SHA1
c8d89d8a237e430a7ec5906a5ed8d0c840537bcb
-
SHA256
9a4e2b892e38c13f3e3fe0cfa0263142fdfe5cf599421ce268b26a5849e711e0
-
SHA512
933b41a6bcf3b46091ba928df4b27a2b5c45341c09f6ea5cb18e2f7b16c443f67d40c8d6c4b301975969d3d36b93b266e0acd0a7780e3325307e236d00b9cc80
-
SSDEEP
3072:bMBnzv3lkEn8Nc/m1LFAENzpZ9PfXbPAC1/3oRcBzO+rhmDsSrtCY00l70h:bMBNlmFXrPjACRov+rhmjCx0pW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2256 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2020 78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe 2020 78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2256 2020 78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe 30 PID 2020 wrote to memory of 2256 2020 78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe 30 PID 2020 wrote to memory of 2256 2020 78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe 30 PID 2020 wrote to memory of 2256 2020 78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2732 2256 cmd.exe 32 PID 2256 wrote to memory of 2732 2256 cmd.exe 32 PID 2256 wrote to memory of 2732 2256 cmd.exe 32 PID 2256 wrote to memory of 2732 2256 cmd.exe 32 PID 2256 wrote to memory of 2736 2256 cmd.exe 33 PID 2256 wrote to memory of 2736 2256 cmd.exe 33 PID 2256 wrote to memory of 2736 2256 cmd.exe 33 PID 2256 wrote to memory of 2736 2256 cmd.exe 33 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2736 attrib.exe 2732 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\BZ1IH2~1.DEF\storage\PERMAN~1\chrome\idb\291806~1.FIL\10D2TM~1.BAT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Local\Temp\78269843d7380e8412a02ec977cf664a_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2732
-
-
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\storage\permanent\chrome\idb\2918063365piupsah.files\10D2.tmp.bat"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\BZ1IH2~1.DEF\storage\PERMAN~1\chrome\idb\291806~1.FIL\10D2.tmp.bat
Filesize652B
MD5d46003bb036dcc634be001a5703955af
SHA1494875e3dcc8a2ed8b5f6d3c5cdf05528ac0c95f
SHA256da14da95de4dc6c57b9ec79c0b6396d37e03c2e57f0201694ec07084581a2e49
SHA512c27d4fb27eb3ea3e5e54ab37b5dfe75ad2eded7ca00050d6ef4259fe2729c766ed6c48b8e506c332cb4fab03994d83c9d350f72e7620b6244534447fe7d5a8e3