Analysis
-
max time kernel
134s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 10:20
Behavioral task
behavioral1
Sample
a66704fa99111103386727ef5eee679d_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
a66704fa99111103386727ef5eee679d_JaffaCakes118.exe
-
Size
6.6MB
-
MD5
a66704fa99111103386727ef5eee679d
-
SHA1
7595e38bf1e39aba91813f341f3f012c25e4faf7
-
SHA256
6c4c8cfd02098f6f3b43bcc9fbcadeeebacf6c2d0c9c6b8334c4ec1b120cefec
-
SHA512
1e944ee55402da2161270e1946177b1183ffa12e22d924e568b9b2e2d11915635b96bee1434c922c0d6bf43526430dac7a834714f3d91c3c176ac2076877571e
-
SSDEEP
196608:GC+gp1DM9onJ5hrZER9xQ3jo4UQ7+wKIAFuD:7pNM9c5hlER9xA2QSXIA
Malware Config
Signatures
-
Loads dropped DLL 13 IoCs
pid Process 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 4360 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 7 pastebin.com 8 pastebin.com 13 discord.com 15 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ipinfo.io -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3292 wrote to memory of 4360 3292 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 85 PID 3292 wrote to memory of 4360 3292 a66704fa99111103386727ef5eee679d_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a66704fa99111103386727ef5eee679d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a66704fa99111103386727ef5eee679d_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\a66704fa99111103386727ef5eee679d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a66704fa99111103386727ef5eee679d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
PID:4360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD57942be5474a095f673582997ae3054f1
SHA1e982f6ebc74d31153ba9738741a7eec03a9fa5e8
SHA2568ee6b49830436ff3bec9ba89213395427b5535813930489f118721fd3d2d942c
SHA51249fbc9d441362b65a8d78b73d4fdcf988f22d38a35a36a233fcd54e99e95e29b804be7eabe2b174188c7860ebb34f701e13ed216f954886a285bed7127619039
-
Filesize
84KB
MD5499462206034b6ab7d18cc208a5b67e3
SHA11cd350a9f5d048d337475e66dcc0b9fab6aebf78
SHA2566c2bbed242c399c4bc9b33268afe538cf1dea494c75c8d0db786030a0dcc4b7e
SHA51217a1191f1d5ca00562b80eff2363b22869f7606a2a17f2f0b361d9b36b6e88cb43814255a5bac49d044ea7046b872bac63bd524f9442c9839ab80a54d96f1e6b
-
Filesize
123KB
MD5b74f6285a790ffd7e9ec26e3ab4ca8df
SHA17e023c1e4f12e8e577e46da756657fd2db80b5e8
SHA256c1e3e9548243ca523f1941990477723f57a1052965fccc8f10c2cfae414a6b8a
SHA5123a700638959cbd88e8a36291af954c7ccf00f6101287fc8bd3221ee31bd91b7bd1830c7847d8c2f4f07c94bc233be32a466b915283d3d2c66abed2c70570c299
-
Filesize
64KB
MD560f420a9a606e2c95168d25d2c1ac12e
SHA11e77cf7de26ed75208d31751fe61da5eddbbaf12
SHA2568aa7abe0a92a89adf821e4eb783ad254a19858e62d99f80eb5872d81e8b3541c
SHA512aaf768176cf034004a6d13370b11f0e4bbf86b9b76de7fa06d0939e98915607d504e076ad8adb1a0ebfb6fd021c51764a772f8af6af7f6d15b0d376448aba1a7
-
Filesize
158KB
MD5bc118fb4e14de484452bb1be413c082a
SHA125d09b7fbc2452457bcf7025c3498947bc96c2d1
SHA256ac0ceb8e6b5e67525b136b5ce97500fe4f152061b1bf2783f127eff557b248a3
SHA51268a24d137b8641cd474180971142511d8708738096d865a73fb928315dd9edf46c4ebf97d596f4a9e207ec81828e5db7e90c7b8b00d5f416737ba8bffc2887bf
-
Filesize
78KB
MD50df2287791c20a764e6641029a882f09
SHA18a0aeb4b4d8410d837469339244997c745c9640c
SHA25609ab789238120df329956278f68a683210692c9bcccb8cd548c771e7f9711869
SHA51260c24e38ba5d87f9456157e3f4501f4ffabce263105ff07aa611b2f35c3269ade458dbf857633c73c65660e0c37aee884b1c844b51a05ced6aed0c5d500006de
-
Filesize
150KB
MD566172f2e3a46d2a0f04204d8f83c2b1e
SHA1e74fee81b719effc003564edb6b50973f7df9364
SHA2562b16154826a417c41cda72190b0cbcf0c05c6e6fe44bf06e680a407138402c01
SHA512123b5858659b8a0ac1c0d43c24fbb9114721d86a2e06be3521ad0ed44b2e116546b7b6332fd2291d692d031ec598e865f476291d3f8f44131aacc8e7cf19f283
-
Filesize
767KB
MD5850f8bb20c2d96b64cf46bc17563adea
SHA1ae42c2bf54850e0932386e8abd8196cea17fb54a
SHA256186da46a5f0d8f2b3eb785a19db554de29b834a5383f92c120b3fb3a4e954364
SHA5122d1e20afa49e0d7fb116eed9fae0955fb43fd6f303acdf82ad7b719ccfca7f361492dde821b29a1ee7688962811b582297340835754353dc6e7eed355c93bed8
-
Filesize
3.2MB
MD5cc4cbf715966cdcad95a1e6c95592b3d
SHA1d5873fea9c084bcc753d1c93b2d0716257bea7c3
SHA256594303e2ce6a4a02439054c84592791bf4ab0b7c12e9bbdb4b040e27251521f1
SHA5123b5af9fbbc915d172648c2b0b513b5d2151f940ccf54c23148cd303e6660395f180981b148202bef76f5209acc53b8953b1cb067546f90389a6aa300c1fbe477
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
673KB
MD5bc778f33480148efa5d62b2ec85aaa7d
SHA1b1ec87cbd8bc4398c6ebb26549961c8aab53d855
SHA2569d4cf1c03629f92662fc8d7e3f1094a7fc93cb41634994464b853df8036af843
SHA51280c1dd9d0179e6cc5f33eb62d05576a350af78b5170bfdf2ecda16f1d8c3c2d0e991a5534a113361ae62079fb165fff2344efd1b43031f1a7bfda696552ee173
-
Filesize
4.2MB
MD5c4b75218b11808db4a04255574b2eb33
SHA1f4a3497fb6972037fb271cfdc5b404a4b28ccf07
SHA25653f27444e1e18cc39bdb733d19111e392769e428b518c0fc0839965b5a5727a2
SHA5120b7ddbe6476cc230c7bdd96b5756dfb85ab769294461d1132f0411502521a2197c0f27c687df88a2cd1ab53332eaa30f17fa65f93dac3f5e56ed2b537232e69c
-
Filesize
27KB
MD5a2a4cf664570944ccc691acf47076eeb
SHA1918a953817fff228dbd0bdf784ed6510314f4dd9
SHA256b26b6631d433af5d63b8e7cda221b578e7236c8b34b3cffcf7630f2e83fc8434
SHA512d022da9e2606c5c3875c21ba8e1132ad8b830411d6ec9c4ddf8ebd33798c44a7e9fe64793b8efb72f3e220bb5ce1512769a0398ecc109f53f394ea47da7a8767
-
Filesize
1.1MB
MD55753efb74fcb02a31a662d9d47a04754
SHA1e7bf5ea3a235b6b661bf6d838e0067db0db0c5f4
SHA2569be2b4c7db2c3a05ec3cbd08970e622fcaeb4091a55878df12995f2aeb727e72
SHA51286372016c3b43bfb85e0d818ab02a471796cfad6d370f88f54957dfc18a874a20428a7a142fcd5a2ecd4a61f047321976af736185896372ac8fd8ca4131f3514