Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 20:17

General

  • Target

    9494fda8c25ebfa77adad42bc2b903ca_JaffaCakes118.exe

  • Size

    477KB

  • MD5

    9494fda8c25ebfa77adad42bc2b903ca

  • SHA1

    9b5394d5094988993110d2b82ee175c7605c124a

  • SHA256

    4a0d1aeb75dd934d0d6ff242903c99cd6bf6b0b235edb77a41eb21290153d1cc

  • SHA512

    de79787abb6f8e6d371b3d3868a011d1a159edf26f8c6566234d9dc632c462f01318170476689fbfdcf7c3cbe32d5e27e495da360a45d27dab4c3071f7753260

  • SSDEEP

    12288:0WN0Jks96wYNt3Nj41Xd9VFtHp9V4DWhSQ:0hJksQwYNt3Nj4ntL4DW

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 5 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9494fda8c25ebfa77adad42bc2b903ca_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9494fda8c25ebfa77adad42bc2b903ca_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Suspicious use of SetWindowsHookEx
    PID:1988

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\win.ini

          Filesize

          552B

          MD5

          6cc5cc680d03984e683c0f15eb19f608

          SHA1

          f70ba6b80ead806212e66c2f75d607c442af6f98

          SHA256

          580a3432e8b9508f88f11abe383231229ae02de51ea86f500c35fddaae921235

          SHA512

          2aa13cbe776fcc552df985325844f1281c5ca121cd8b694c765e49f1c4e0b8bdae174fbde852404acb57615dfc94c46744ccfb6fa5351346df9aca2ef657825a

        • C:\Windows\win.ini

          Filesize

          523B

          MD5

          2f2827cf16c9d19ce5be88abf6b1a03f

          SHA1

          d2d728ab37601ceee50fca9be401b9d0769bd53a

          SHA256

          1ea017e4cf4dbcfc67539a29502ca0228c16ac8dc0799764129adf11251666d6

          SHA512

          039963af757ffe1b65eab325d23ec32460f20c6ef35186eda51b3e43a735ad58c8928971603b43e1dd1ab713b8e3616c481b3663e645f723e83676528bc38e6a