Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe
-
Size
177KB
-
MD5
b53a404cb29fa6f173964c1a83a50a2f
-
SHA1
035e19be09bb4fe5e36483b0edce76b9a6f9eb05
-
SHA256
146bf4a9cfbe81d8022474ac64f8efe375f6175ed131c3e8a7b6307678bc7518
-
SHA512
f0a8632fc51336c244a0bbdba80170071328193ad2d27ee5e87443562c4360c9224def9545ad0ebf3ac38efc288da27071d586927045878968333cf8afe7dc7f
-
SSDEEP
3072:oAalUMyDosbO9Wo29J1BOWn4ylJIHksnVatSj6Rfv/HEcTKB9TX:ozU1qo5n1fIEgVaAGBHyBJ
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2060-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2740-7-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2740-8-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2060-19-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2216-83-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2060-195-0x0000000000400000-0x000000000044B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2740 2060 b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 2740 2060 b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 2740 2060 b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 2740 2060 b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 2216 2060 b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe 32 PID 2060 wrote to memory of 2216 2060 b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe 32 PID 2060 wrote to memory of 2216 2060 b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe 32 PID 2060 wrote to memory of 2216 2060 b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b53a404cb29fa6f173964c1a83a50a2f_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD524b283e7506619d7e17acc84b239c63f
SHA15d6fb8528405eaf31f57018a7be2681092d41519
SHA256894068365e77b2f8f8520754f71ef5045514d9a1d24235cbadb8af4eb1f58d85
SHA512eddcd83ea4db955351178eb1a0536264ce16ec0b9b847952ef25d714adf7a3d9002bb636495341a3ed7703683805ec5d1e312b71ee6a3dc1a4d794ccbc2999a3
-
Filesize
1KB
MD5acefb08fcfec018ada57a77aa5d1295c
SHA113f75e7aebd03bb9ad27240b28d06d27da3ecf18
SHA256a650be447653677f2bc282bae6c5d43c1ea2c5491875e7ef7ad070ae393eeafe
SHA5126a78c060321c897cc644824429eb2933bcfd6983e6aa56645d4ceb3a65ceff39536968cd360638ebe2cda503e51e73291e0e8f90f777e7b694ea28ebd2bc51e7
-
Filesize
1KB
MD57305079b307e29aa4e00f92bac916aae
SHA126c1f5322bf8f3fe597b34c7bf563f8081af180f
SHA25693591311ec9df145f2535a399eca7dd46d155b6571329345387aee198aeeef96
SHA512ac45cc751034a823e62ec5704bf3df03b0b696eb71343b1df205d456a02ddb084672bf5fbca9de2fc78ffe728d46cda0cadfc90db737f990d08b3b7fc32db614
-
Filesize
897B
MD51da05fe1d6081d36c71e9093662b9a34
SHA10cd42b79d7934426533eaeecaddecba81d627b22
SHA256503206640fc72104ac3fc999b1d49ccc640387ce0f969bcae5e52550c3f4f46f
SHA512a0a37918fafa6f68f9a6fc1bf83a8938ad3f199a84727c96063b506b04cabbc9df64329eeca5535c29e67ded5ecb47284af2afb41edb274f3371d1a62bee2422
-
Filesize
1KB
MD5cde1f36cd0ceeb24caa3548d215d250b
SHA17b0e0f1eb5f14d72966c7f314cf4d74c4148739f
SHA2560011ad19cf2a79f24cc11bbd78607068049a09aac0715fa49de4b3ab588767c8
SHA512bd2c63a9dab378055e69c6931e845d92b80e9ee58c327b4ba88631552564aa55ce542ce12d56218910f533349644de4cf108e407fd24eb05190e8815a3b8a591