Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 11:27
Behavioral task
behavioral1
Sample
a699e1ad9353c61a57beb94bbcb1477f_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
a699e1ad9353c61a57beb94bbcb1477f_JaffaCakes118.exe
-
Size
388KB
-
MD5
a699e1ad9353c61a57beb94bbcb1477f
-
SHA1
79b764739727a3b2c4417117eb0bcbe3b3c7c219
-
SHA256
526f8c55806ee85cb60f0b4eea4e0f61e23c63117445e7f14b7ddb19edfe8252
-
SHA512
176a3bcf261f09c1e891dcc1736ab35fcd050f3ee57b6fd71bf8a8455de987e635d4738dbb01e1832f405750cbaa26801c49d8133662d559d8eb2cfd2656dbef
-
SSDEEP
12288:W0Zfg9itb2jb+ekB9pKHa5KYR/uvRagEwoSTesW:W0ZgAgnPT65KYR8RagTW
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3060-0-0x0000000000200000-0x0000000000350000-memory.dmp upx behavioral1/files/0x0008000000016d65-10.dat upx behavioral1/memory/3060-11-0x0000000000200000-0x0000000000350000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a699e1ad9353c61a57beb94bbcb1477f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 1720 3060 a699e1ad9353c61a57beb94bbcb1477f_JaffaCakes118.exe 30 PID 3060 wrote to memory of 1720 3060 a699e1ad9353c61a57beb94bbcb1477f_JaffaCakes118.exe 30 PID 3060 wrote to memory of 1720 3060 a699e1ad9353c61a57beb94bbcb1477f_JaffaCakes118.exe 30 PID 3060 wrote to memory of 1720 3060 a699e1ad9353c61a57beb94bbcb1477f_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a699e1ad9353c61a57beb94bbcb1477f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a699e1ad9353c61a57beb94bbcb1477f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\612.bat2⤵
- System Location Discovery: System Language Discovery
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5a699e1ad9353c61a57beb94bbcb1477f
SHA179b764739727a3b2c4417117eb0bcbe3b3c7c219
SHA256526f8c55806ee85cb60f0b4eea4e0f61e23c63117445e7f14b7ddb19edfe8252
SHA512176a3bcf261f09c1e891dcc1736ab35fcd050f3ee57b6fd71bf8a8455de987e635d4738dbb01e1832f405750cbaa26801c49d8133662d559d8eb2cfd2656dbef
-
Filesize
177B
MD5f2cce771b193b12b111c57744fd20019
SHA160a4b3dcf466ffc899362d37ed0126346011805d
SHA256b1dbc35a664d5044e5ee8af042bfa6d796435dcecf72d0a0f1f3a47430e94dda
SHA5122de2064b3b392afe9c3707a2b79825d3c842fc37709ac9f20f1f01cc949dab96088586f5dd06c97300bde204104bfe6fb5e5265276b6cb2feca9ecde8c724279