Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 02:11

General

  • Target

    889800c260bacd03f009ffa09331c7eb_JaffaCakes118.exe

  • Size

    748KB

  • MD5

    889800c260bacd03f009ffa09331c7eb

  • SHA1

    c370fb627bd083bc5090cf573f6f668bc1a76817

  • SHA256

    26efde628a7d76565c81f093308e36cbf5613a746f10ae90b35910c3117ae95b

  • SHA512

    9a9fe2c6bbc5f710fdaab5c66a83a99d646f8699c1f3ce4288901d1486430b4be815de1a7076e2b70c4e7f4a27b343fba738b1b07ecd722b08fc4c500be257a7

  • SSDEEP

    12288:ZyFIUUz8iVmHZ9SqC64HbY30bcoLmvLW6Y:Z1UomHD9CZHM3XoLmvnY

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\889800c260bacd03f009ffa09331c7eb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\889800c260bacd03f009ffa09331c7eb_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads