Analysis
-
max time kernel
141s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe
-
Size
164KB
-
MD5
8c70b8d05096f429ff0e08c65e3054d0
-
SHA1
93349363a101bb2eac87f70aa8f083badbfc60b5
-
SHA256
48b0eb7494c93ae0a62eca8761334af1d8a1c7e22b3da85536d53a3ec6c40f43
-
SHA512
dd1787523d95f51a284b8778fa0240cf473b501fb433592617d8e41326b2dc70d399f3d3590994dff21acc4b8b1b9a21127dd6557bdaae603d808c4a7db5d65a
-
SSDEEP
3072:JtOBwK0TlLm8lirVlOJARb1X28BVmXIVWTjj3vfo69c:J8BO61ZlnzuXIVyHI6+
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2972-1-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/1336-12-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2868-84-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2868-85-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2868-83-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2972-82-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2972-190-0x0000000000400000-0x0000000000444000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1336 2972 8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe 29 PID 2972 wrote to memory of 1336 2972 8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe 29 PID 2972 wrote to memory of 1336 2972 8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe 29 PID 2972 wrote to memory of 1336 2972 8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2868 2972 8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe 31 PID 2972 wrote to memory of 2868 2972 8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe 31 PID 2972 wrote to memory of 2868 2972 8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe 31 PID 2972 wrote to memory of 2868 2972 8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\8c70b8d05096f429ff0e08c65e3054d0_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5c877023eb99ba7d5226f59bc97e3444d
SHA153936ccd9f22011071826de68378d88b1b215617
SHA2567b9956c1f38e401a897590d06de136c1fe4785717be923c0cc363d3bcc166b2b
SHA51228485b2f8a6aa844ab8b0d4f913f60aaf94abc5d4bef48ff2aaf48ea7ca19d370649ceaa3e9b310e9c6a2ef9b9948856b858ea920863156e5655a2364afdc8bd
-
Filesize
1KB
MD5f4d775afef436d81bef629bbe8e02cad
SHA1e4aff24a862e2005fcc269290c015d9275eaa59d
SHA256d86414e53be9b605ca89b028dacf1328f7694a85020e0e4aea073bc549a045d7
SHA512aa07786405eea163f5b6e5abc7f54c9e82ddebe760cf471733db45aa15721a37fecb437dba7042d59385d01ed0070c3b03060c1669d10313d4dd633156276470
-
Filesize
600B
MD5a039a4bf69c244654b1efde671356561
SHA1f70d5a8ad556f3a233cb141728d40cfd76f739d1
SHA256336b7222d256b86fa16be1306afdbef57d09781fa2bc358bd9e548cd615002e0
SHA5126bc6406be1b55dd04115f41839338c2e517b2d843d7d9a93a9dbc4f4755d0a5a297d89d6ac171c7526e1c15138bbcc529528709e6aa998d5aa6b0e448deeb597