Analysis

  • max time kernel
    134s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 15:40

General

  • Target

    a73aa55d8069f5ea9d8fd82337b45f71_JaffaCakes118.exe

  • Size

    486KB

  • MD5

    a73aa55d8069f5ea9d8fd82337b45f71

  • SHA1

    e0aeb5fa1528179b3ab7bc49a6ec407679b50c75

  • SHA256

    50f6f71e163bc920a23de81c5ca14399a1712bec31cd6b0ed110fc1a16393295

  • SHA512

    1e56280dde7a5942a918dea0fed092c6cf244a03d621840690cb8b14321fbbc17aaa4eafb7a204ff7701d0913afc7002a08019b4a14101795b033aba17c1bfa6

  • SSDEEP

    6144:DFF9+2oSnWROvI2s6s5Mbx4SP4CeispUmBsaLYZHLlza/aGyKL2vZVh2zJeeZb:7KMWAIp6sM/45iOB/eHLRCByKMVhWb

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a73aa55d8069f5ea9d8fd82337b45f71_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a73aa55d8069f5ea9d8fd82337b45f71_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsw979E.tmp\IpConfig.dll

    Filesize

    114KB

    MD5

    a3ed6f7ea493b9644125d494fbf9a1e6

    SHA1

    ebeee67fb0b5b3302c69f47c5e7fca62e1a809d8

    SHA256

    ec0f85f8a9d6b77081ba0103f967ef6705b547bf27bcd866d77ac909d21a1e08

    SHA512

    7099e1bc78ba5727661aa49f75523126563a5ebccdff10cabf868ce5335821118384825f037fbf1408c416c0212aa702a5974bc54d1b63c9d0bcade140f9aae1

  • C:\Users\Admin\AppData\Local\Temp\nsw979E.tmp\System.dll

    Filesize

    11KB

    MD5

    a78507ea1078cadaa8b2ec1a2e1d874f

    SHA1

    77fe20488444ebbaafc5b2c0743251a94edc3b8e

    SHA256

    93d1e681daebfd24ff9fab3952e8ae94eddbdfb3650937988c1fd8085991610e

    SHA512

    0399452c7305f23576d4175ec198ad8da8a530215e9304632b20bcb41a38fa0ba2c1c0b0b734b9f887851c92c7f2cf4cdfad403ace84e63318c0694402e1f270

  • C:\Users\Admin\AppData\Local\Temp\nsw979E.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    e301e0184786c5c75b4b34e4d04608eb

    SHA1

    02382247eeec365f3b47518efe0a8f3a896f28a3

    SHA256

    02869a0f0b3826af1c859e57541b38869c506fbbf15cc5ca28edbe18776aa3b5

    SHA512

    3dc744d2f92dc6fb13f9f431a51fdad39bbcf863f273d5f203c729111c120586e96ea0e79f5c5fe821d3f67ea34f4ab6abe88cdde84e9e09da92d1e7a109d982

  • C:\Users\Admin\AppData\Local\Temp\nsw979E.tmp\nsisos.dll

    Filesize

    5KB

    MD5

    69806691d649ef1c8703fd9e29231d44

    SHA1

    e2193fcf5b4863605eec2a5eb17bf84c7ac00166

    SHA256

    ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6

    SHA512

    5e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb

  • memory/2148-17-0x0000000003620000-0x0000000003647000-memory.dmp

    Filesize

    156KB