Analysis
-
max time kernel
66s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:05
Static task
static1
Behavioral task
behavioral1
Sample
81c435ee3ef0afad8840d125ef06794b_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
81c435ee3ef0afad8840d125ef06794b_JaffaCakes118.exe
-
Size
528KB
-
MD5
81c435ee3ef0afad8840d125ef06794b
-
SHA1
2fc6d4bf253b810dea4c4fba82a419aa43713413
-
SHA256
2693973d978d0875aec9484c07a17ed5c4fe6141347a0ecb441536521929dde5
-
SHA512
a2158a4e09d23853318830419284291f22c211924f635bdaf296ecbe23b9d2b31aa1dd26622493c821fded2dc49082ae6e1a8e6db8c88f89eef50075c2aa6b92
-
SSDEEP
12288:9bXSLOD9xYRm7yDUFLOqpcV0HAppjaJUpw:9is9ORm7yDUFjSTpX
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
81c435ee3ef0afad8840d125ef06794b_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81c435ee3ef0afad8840d125ef06794b_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4956-0-0x0000000002330000-0x0000000002331000-memory.dmpFilesize
4KB
-
memory/4956-1-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4956-2-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4956-3-0x0000000002330000-0x0000000002331000-memory.dmpFilesize
4KB
-
memory/4956-4-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4956-5-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4956-6-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4956-7-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4956-8-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4956-9-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB