Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 18:38
Behavioral task
behavioral1
Sample
9737f768f5539cb2a0853f265e4c32a1_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
9737f768f5539cb2a0853f265e4c32a1_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
9737f768f5539cb2a0853f265e4c32a1
-
SHA1
e91bac502e203094878457a58a70aa0261bc6322
-
SHA256
3ecdf68050037397581c45131bfc498c245bb4f81b484ce05454739ef56e84aa
-
SHA512
6fbcd5ab193fd7a9193238b031e1efef8efae52d6d24f011bd0420baffe6b330c126f5315bc6d20ff50186ec175910db93ef9c41a187e20aa1d4b36b55e6df22
-
SSDEEP
24576:hbIQ9iBHtWkOLTBDNSl6nNoYOmubsdI5oansjqFJaN0cKKwt:Z9ibiTBDNXTJjqFDc9w
Malware Config
Extracted
ffdroider
http://101.36.107.74
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9737f768f5539cb2a0853f265e4c32a1_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1564 3732 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9737f768f5539cb2a0853f265e4c32a1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3732 9737f768f5539cb2a0853f265e4c32a1_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9737f768f5539cb2a0853f265e4c32a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9737f768f5539cb2a0853f265e4c32a1_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 15002⤵
- Program crash
PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4188,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=3996 /prefetch:81⤵PID:3616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3732 -ip 37321⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD58c3f491e2842587f58e98715628f873b
SHA1669fa736c24f065b7cda033b861836f95806dfe3
SHA256dd1257fa2585b33d2102eb7476c9d5b8122993275731d88ba75eb02f165b28b5
SHA512e905e90c63ea476e0c668487d49cb330015b36076a75eb7be7d75d33037061e361cd016de4afbf31bd5393707e4fa1d75d71febbef1127ed8d59162788a8a709
-
Filesize
16KB
MD51d17e04ecf92bcfb7149d58d6dfb273c
SHA1636f18b93ef64fe58fc8eeb69f239a48b2f2e24b
SHA25681e3d12157c3fed3a74abba2469c3faf7b2428878a40ad790cebbd998b4cc376
SHA51232d96e413820bbb3610a8c38d184b3e2d1afceda6afe189f346a23927f4381b4e88212f261a541adb75d0ce54310f08070041be0c4450b87ea355497c114d1d9
-
Filesize
16KB
MD5a8314ae1a906b58f58f0d26b19f16d42
SHA197e8313cd34f79b00b097dbe29a60a51e803942a
SHA25643cb61971ca8f70fcf06ec9dad62bded0dbec0b4bc5e0469ffc664d1391bca38
SHA512c675b83be3c4de0feeeb695e1dc8b5589dcbe2298f6fc800898db152aee0170961487c0930267df163bc17701e78848fa06f7c29069ac461e369ef7052a5cb26
-
Filesize
16KB
MD5166d30103ef57da896331adb1a13964d
SHA141c8f7786fd1f8f279168bc3a138d5651d315bb1
SHA256c1565f239cba456549d98c96fdaac873ceb5389efecad191857718cde6e955f7
SHA51202b8bfb57b7b59d4f6222ab2c2a4bef2239523927e3836e36c661f69e42a58693def3d39eb020062478c8ee956dc44cf2e6e8527c6c2809955a65bd3679f5b80
-
Filesize
16KB
MD583a67a83ed98a1c79a2dfcb38ccf7689
SHA14bd4829230f8ececd2f707ecef278274f5ff55e1
SHA25615cf63c8ec680648e323c20f28335a7180c8aa34db152f35d6f477615cfcbe50
SHA512a26343664ad7d8cec3d7ff813be3ead8feb4d5a6110ebcc2d132a2aa63883c570d23e3968c827cc705e7e753643393214b35aa8771c9c17618f01a3a8fbf6882