Analysis
-
max time kernel
23s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 18:38
Behavioral task
behavioral1
Sample
9737f768f5539cb2a0853f265e4c32a1_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
9737f768f5539cb2a0853f265e4c32a1_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
9737f768f5539cb2a0853f265e4c32a1
-
SHA1
e91bac502e203094878457a58a70aa0261bc6322
-
SHA256
3ecdf68050037397581c45131bfc498c245bb4f81b484ce05454739ef56e84aa
-
SHA512
6fbcd5ab193fd7a9193238b031e1efef8efae52d6d24f011bd0420baffe6b330c126f5315bc6d20ff50186ec175910db93ef9c41a187e20aa1d4b36b55e6df22
-
SSDEEP
24576:hbIQ9iBHtWkOLTBDNSl6nNoYOmubsdI5oansjqFJaN0cKKwt:Z9ibiTBDNXTJjqFDc9w
Malware Config
Extracted
ffdroider
http://101.36.107.74
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9737f768f5539cb2a0853f265e4c32a1_JaffaCakes118.exe