Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
81c567bc4c5a9c558622b74b6fb0935e_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
81c567bc4c5a9c558622b74b6fb0935e_JaffaCakes118.exe
-
Size
453KB
-
MD5
81c567bc4c5a9c558622b74b6fb0935e
-
SHA1
4dbcb180e67254329cc43bb8f0919b031f6317fc
-
SHA256
89492b5f33a3ff7ec46bfdfc13a9b30df7194691a0a809f705f058125d1c8bef
-
SHA512
8b6ffc9887c3b44a0743bd3e3a40062288eb14563824e6947271229c3e89621f0cb343963aa2da86f746e56b933bfb33e073319c386b2d9d2836d9c7f5320488
-
SSDEEP
12288:4QUwe7QbXs0DcW+smXWvbSed/T7Sdabv8LhbQ:4QUWXBDcs/eeN6y+hbQ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4920 81c567bc4c5a9c558622b74b6fb0935e_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 81c567bc4c5a9c558622b74b6fb0935e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81c567bc4c5a9c558622b74b6fb0935e_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
977KB
MD5e142a0e9faebdc44d4b692e30827bd0f
SHA1ff83ff5dea3e3f2b75b6f2445fd74f12cdc4f9a4
SHA256fc0ef9bd7711fe39fc075d3d239cc14b293b775ecd42e735928b853f0f5c9a70
SHA51267c700f342ee2ae0f0c7d0ec84eac40356620c949b1b3e93fe83edff954a688d847e37be6150491e3f5580a9a419c028c9b35f8baa43455519e5a076527069ae
-
Filesize
17KB
MD5aa91818150cfadb667ae6f914d43dca0
SHA14411bd0038ccd464ed7597f0540cfe04867b9042
SHA2562aa71646493cf47b38be0920488159b154eaf19193dc4a6ecfa0a6509196c7c5
SHA512dd1310dc52bb6cc4977341dc34fb6a273e1349602a5fb3037e0b0d087b8f0d2d7a04e2db32e2708379758266c31422d27b5a35f5ba068cd7dbdd211b07893ecd