Analysis
-
max time kernel
90s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
9651a752832b807f9f741bef02e7c3aa_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
9651a752832b807f9f741bef02e7c3aa_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
9651a752832b807f9f741bef02e7c3aa
-
SHA1
2a90e0f8da893a333508199f1911637a59c7b4a6
-
SHA256
0714b15aa52b16880f376009df72dd55a42de245300dddcb3ea636d2e5223bde
-
SHA512
13e02c0b4ae9c164149ccf90618870daaf0873cdbb0a71a32d5582e1d25e7ca61a35ce646e96655c509b7a2cf0a365e1ebbda2284f2ce712e2477734cd1e6f22
-
SSDEEP
24576:t02n2HC576LcmU8gExPPycUZoh3bW+rQ2YlilTHQawvnWQ1P:t0+B6L4gycUSFvrQ2milTwag1
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9651a752832b807f9f741bef02e7c3aa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2084 9651a752832b807f9f741bef02e7c3aa_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2140 2084 9651a752832b807f9f741bef02e7c3aa_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2140 2084 9651a752832b807f9f741bef02e7c3aa_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2140 2084 9651a752832b807f9f741bef02e7c3aa_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2140 2084 9651a752832b807f9f741bef02e7c3aa_JaffaCakes118.exe 30 PID 2140 wrote to memory of 1980 2140 net.exe 32 PID 2140 wrote to memory of 1980 2140 net.exe 32 PID 2140 wrote to memory of 1980 2140 net.exe 32 PID 2140 wrote to memory of 1980 2140 net.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9651a752832b807f9f741bef02e7c3aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9651a752832b807f9f741bef02e7c3aa_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:1980
-
-