Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe
-
Size
183KB
-
MD5
866c8bb63f6289832d95a8925eb07db6
-
SHA1
8c8c9a8fa2c8b1dbae3e104c09005b3bc5dad175
-
SHA256
9b57b215e59de5823b0ac6e9f6689c3ca6971bfa309568b4e3e9114f9112b2fc
-
SHA512
7300412d8366f9a9ebd90e2f3d67d8ff89c76e760531788b09925e513e4812a7caa746a444b7b338970e58045b9df50c95373c9a5523dc6ed3d0fc7ed702a36d
-
SSDEEP
3072:RwK+yDUmJIuEw1UnUYs9tJogQFAZYKlixZy6Na8MYpaSyWf8nfsemQBY+ySS0N:aK+yDUm9WUlNTQGcy6E8XaSNKssyS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3064-1-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/1940-12-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/1940-13-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/1484-85-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/3064-87-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/1940-163-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/3064-195-0x0000000000400000-0x0000000000470000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1940 3064 866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe 28 PID 3064 wrote to memory of 1940 3064 866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe 28 PID 3064 wrote to memory of 1940 3064 866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe 28 PID 3064 wrote to memory of 1940 3064 866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe 28 PID 3064 wrote to memory of 1484 3064 866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe 32 PID 3064 wrote to memory of 1484 3064 866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe 32 PID 3064 wrote to memory of 1484 3064 866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe 32 PID 3064 wrote to memory of 1484 3064 866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\866c8bb63f6289832d95a8925eb07db6_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD50509458781af6dd58668215ca6b7cf5f
SHA19d8c32e3814871a1beedf2d36366af5b35424454
SHA25687d21071ce9cf77a3941ffc90f5cb055748d785d67bc93eb22b32bbeb7c84d9e
SHA512115fa99fcb2eaa0afeb29894d41f449ca26935178ea739d70dbeeb5bb5c6e44238feee642a7843aa59b492212e077cb3d062a43c0541ec943d57c8c9ec555d30
-
Filesize
1KB
MD53e2d0935abbe1356c23c42d5a0ff9291
SHA11e2c4e0f51c5ca358782869f4fd7589870a0feaf
SHA25665de4df5116b6fe0df6037fde9df23467790c5c160f961063bbca62791566470
SHA51206fecf452e207d8d9cd790ae05c67acd514cc386b9c465816415617861c969335ba70bbb386a2a13b2344bd758e7ecba2e8b1fbb5c0d34637fdff5cfd296d693
-
Filesize
996B
MD540bb07c351cf3c8e7df20ff83d370080
SHA1470a994767eb09614a5c4633c0e4f47f8577a2c1
SHA2566ca742e9203c9842820ff76f57158d7be0f8212520f97859ee5d8eba718eed7e
SHA5123f27221eb632d22751e53956824e90f4c0ec81e83e9bfed23458b63eaa976d0a8911033c1fb535ccfca1f67f8b54da287cb1c7a41bd8af64b6a04b2bbcb0f7b5