Analysis
-
max time kernel
109s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 06:57
Behavioral task
behavioral1
Sample
0da1abdccef71f074faeb911cafb3a9f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0da1abdccef71f074faeb911cafb3a9f_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
0da1abdccef71f074faeb911cafb3a9f_JaffaCakes118.exe
-
Size
307KB
-
MD5
0da1abdccef71f074faeb911cafb3a9f
-
SHA1
c2ed5ff2cd60e7e6193d8f934fce03ceab2f70e2
-
SHA256
87bcf35d7135ecbc956554098f411ef9bf7d20d0a7905442d2417f422d7479b3
-
SHA512
7ac7343f175566a10efa2ecaa0700af2671db07ee052727bdb6c6628d77d4a76f63f858b5e77af6f4eaefebfb592c8ba04b185605a9f6a8f5eb837a74ad6348c
-
SSDEEP
6144:orRt89VZUMTllWjhwuGFXY5mJwpT6jlpVDpPPAu6AkHrW5Tp3PakxMJdE2:orXsZ7TP04I5mCpWjbAu5kQdyk6
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3960-0-0x0000000000700000-0x0000000000750000-memory.dmp family_stormkitty behavioral2/memory/3960-2-0x00000000031E0000-0x0000000003254000-memory.dmp family_stormkitty -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 ip-api.com -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
0da1abdccef71f074faeb911cafb3a9f_JaffaCakes118.exepid process 3960 0da1abdccef71f074faeb911cafb3a9f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0da1abdccef71f074faeb911cafb3a9f_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 3960 0da1abdccef71f074faeb911cafb3a9f_JaffaCakes118.exe