Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
a80ac5e045e949416545bd838263037c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a80ac5e045e949416545bd838263037c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a80ac5e045e949416545bd838263037c_JaffaCakes118.exe
-
Size
119KB
-
MD5
a80ac5e045e949416545bd838263037c
-
SHA1
111e40f2f7c02e0787ed898e660b954c455bfc96
-
SHA256
5ab46ef56f0f3ad9bea88a1f6f1cda5bee2c911e1b188661801b4faa60c1cbfb
-
SHA512
6209e7b36eb741ede982d1356da3a810675e18b970f7ea3be8057b5dab7aaa76f0d6f386c058c5c3b993a6acdfba279af3152b17cf5668e1d8f4c3eca49b73b8
-
SSDEEP
3072:LN6Wyq2wXcbMGFk2HSMrzs75gKyMW5+Y7zomZCnaIh:L0WyvJbMGF3frzcWKY5LzomZIaI
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2732-2-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2272-5-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2272-6-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2272-7-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2732-10-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2732-72-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1112-74-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" a80ac5e045e949416545bd838263037c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a80ac5e045e949416545bd838263037c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a80ac5e045e949416545bd838263037c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a80ac5e045e949416545bd838263037c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2272 2732 a80ac5e045e949416545bd838263037c_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2272 2732 a80ac5e045e949416545bd838263037c_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2272 2732 a80ac5e045e949416545bd838263037c_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2272 2732 a80ac5e045e949416545bd838263037c_JaffaCakes118.exe 31 PID 2732 wrote to memory of 1112 2732 a80ac5e045e949416545bd838263037c_JaffaCakes118.exe 33 PID 2732 wrote to memory of 1112 2732 a80ac5e045e949416545bd838263037c_JaffaCakes118.exe 33 PID 2732 wrote to memory of 1112 2732 a80ac5e045e949416545bd838263037c_JaffaCakes118.exe 33 PID 2732 wrote to memory of 1112 2732 a80ac5e045e949416545bd838263037c_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a80ac5e045e949416545bd838263037c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a80ac5e045e949416545bd838263037c_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\a80ac5e045e949416545bd838263037c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a80ac5e045e949416545bd838263037c_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\a80ac5e045e949416545bd838263037c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a80ac5e045e949416545bd838263037c_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD526b3878feb962b5bfef055eae58a2016
SHA127e4da8fec1dfcb9bd2acd8391c0a3b0e15a5970
SHA2567544597b8884969a9b87c3e01582e8e5b375e07c922d0933dee7b5cc5aa833f2
SHA512831a1359641ee4f8f111a0a020aac32d26286dd783de396e9e157fab95508b6d9c46b45709d0ffe3f86bfe38c6fdee4bc6dc3d3704bd73d8ad73fea39d9a0c82
-
Filesize
696B
MD5d5e469aad580574d08c05597d7b34a64
SHA13a833e19c3769c963f7f66e4c8dbcf6d9c84952e
SHA2564112fd94b99c1b305dc61d1d565ffba60c056d1dbb634201242cc74a7be7aebd
SHA512e08d767e1a304251dd612bf5ea786bf23d27676813b0c253e206eca6c571aa865ecf2ee368186d14d9f0d5d3045e92f7b4ac54fd249c32ad35d27e92020bdb86