Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 00:16
Behavioral task
behavioral1
Sample
b16c4d89c78962fa9d073ec635b74ca7_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b16c4d89c78962fa9d073ec635b74ca7_JaffaCakes118.exe
-
Size
386KB
-
MD5
b16c4d89c78962fa9d073ec635b74ca7
-
SHA1
a1ba579c8a24bdaede6eddcb7db892fd7852ba79
-
SHA256
78c3f67c3294510a1a8ec701b72340d72a60eaf4228c6f9f1ce4b9f057a45b42
-
SHA512
acfadd1c3f15736da7a1ffecf348534601a03f27e676d04b67f05d7c390e1e6c085af80bc98f46badc9c73a872465275c69c03cb3eb4a4d1d15d8202f49222c5
-
SSDEEP
12288:U9xZ5yN3Cwaw//ikDju436I26h+OoS9Otz:U9vsky/7NKDm+1z
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3432-0-0x0000000000400000-0x000000000054F000-memory.dmp upx behavioral2/memory/3432-1-0x0000000000400000-0x000000000054F000-memory.dmp upx behavioral2/memory/3432-2-0x0000000000400000-0x000000000054F000-memory.dmp upx behavioral2/files/0x00070000000234d0-7.dat upx behavioral2/memory/3432-8-0x0000000000400000-0x000000000054F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b16c4d89c78962fa9d073ec635b74ca7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3432 wrote to memory of 1208 3432 b16c4d89c78962fa9d073ec635b74ca7_JaffaCakes118.exe 94 PID 3432 wrote to memory of 1208 3432 b16c4d89c78962fa9d073ec635b74ca7_JaffaCakes118.exe 94 PID 3432 wrote to memory of 1208 3432 b16c4d89c78962fa9d073ec635b74ca7_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b16c4d89c78962fa9d073ec635b74ca7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b16c4d89c78962fa9d073ec635b74ca7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\718.bat2⤵
- System Location Discovery: System Language Discovery
PID:1208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD5b16c4d89c78962fa9d073ec635b74ca7
SHA1a1ba579c8a24bdaede6eddcb7db892fd7852ba79
SHA25678c3f67c3294510a1a8ec701b72340d72a60eaf4228c6f9f1ce4b9f057a45b42
SHA512acfadd1c3f15736da7a1ffecf348534601a03f27e676d04b67f05d7c390e1e6c085af80bc98f46badc9c73a872465275c69c03cb3eb4a4d1d15d8202f49222c5
-
Filesize
175B
MD5043b4456955836911ab7b4ebf8fb51d0
SHA1be08532c0867538dc7e29354548256e2b54109cb
SHA2564f822b55f65082b0a477b0a39ccf9beb7034c93c61afd40d0c09c34e4da11db5
SHA5128b348a4299274e82546613e5649186ffba93611d9b7e64d4a2231ac269b68ad4faabbfb2a200110c67e9ee91bbf6afc6d52223a189307498bbd7c0b951937781