Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe
-
Size
175KB
-
MD5
8ebb5d6d5f2dcdd33a82bc2153ba9f23
-
SHA1
c84e0f1196dcb96871d2d06839cd07ce0fa949f0
-
SHA256
5e8b23b7b147823fc733d78fc1ffd4b48eade62c4651c92160bef5c8af2c5902
-
SHA512
2531fdfba2b85eb420b0cdbf73cc448690c56de0f0cd610da272477f3181de66ccc1b586b4792457ed37d5625a5299fc920f6f7af202d564629a20c46404e89e
-
SSDEEP
3072:la7TcoqnNcv2NhgLWOv9LTOedfLjH0wQm8gz2Ixf:5oqevYhgSOlTRLjHCU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1864-1-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1864-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2220-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2316-84-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1864-85-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1864-192-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1864-197-0x0000000000400000-0x000000000046A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2220 1864 8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2220 1864 8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2220 1864 8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2220 1864 8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe 30 PID 1864 wrote to memory of 2316 1864 8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe 33 PID 1864 wrote to memory of 2316 1864 8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe 33 PID 1864 wrote to memory of 2316 1864 8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe 33 PID 1864 wrote to memory of 2316 1864 8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\8ebb5d6d5f2dcdd33a82bc2153ba9f23_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD54baf34517a3d2e3466c0ef116f9ab9fd
SHA174801ddd10a0f255b5140a54b1ef190b41b235fa
SHA2565c4a8000f8feab5fa0a0895857eecae5934bf80c4ccacb0ab0804f0e32721570
SHA512f5a1c3fc68f93599d1ec7a1e0956732e06cd30f83f3ec66b5a18b1c725b4cbe64a0ddb90e02142004e9b8f22ea83356721df21178c3e0aff7538fca5479ceb4a
-
Filesize
1KB
MD5b819b854c256353e240fdc7a07e09df1
SHA174dfc185ff94530c65481ffd2b05fbee5d48e7bd
SHA256f96baf01260b8e89f68971a79a75ac5abacfa0925b165dbff2f83fc7a2f3fb85
SHA512009d127f27bee9c1aace03b4b4755b847fa3cb42ec2bf4b08ebe12bb2d57cda9cbd43904da8d680b242df607657e11c7cad1c1f1222feed9557e35a4e8fd7d89
-
Filesize
996B
MD574819fbd570e433394ea593a95c5c960
SHA18c03ca31a2781bb5fb41ac618f30911b3320e744
SHA25635d913604c1a18f43bbd0a1372a72669a60c5c19ad22b9f97ee0a8f758f751ec
SHA5121d0523bb77475cbfb2347e02cfa46631ee31a7b29c2a115e0289095647d289de1ad69fe88555fa54880990768cfc730f84bfaff711637a0213a6be9ae31bbaad