Analysis

  • max time kernel
    134s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 00:16

General

  • Target

    b16c4d89c78962fa9d073ec635b74ca7_JaffaCakes118.exe

  • Size

    386KB

  • MD5

    b16c4d89c78962fa9d073ec635b74ca7

  • SHA1

    a1ba579c8a24bdaede6eddcb7db892fd7852ba79

  • SHA256

    78c3f67c3294510a1a8ec701b72340d72a60eaf4228c6f9f1ce4b9f057a45b42

  • SHA512

    acfadd1c3f15736da7a1ffecf348534601a03f27e676d04b67f05d7c390e1e6c085af80bc98f46badc9c73a872465275c69c03cb3eb4a4d1d15d8202f49222c5

  • SSDEEP

    12288:U9xZ5yN3Cwaw//ikDju436I26h+OoS9Otz:U9vsky/7NKDm+1z

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b16c4d89c78962fa9d073ec635b74ca7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b16c4d89c78962fa9d073ec635b74ca7_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3432
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\718.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1208

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\43305.exe

          Filesize

          386KB

          MD5

          b16c4d89c78962fa9d073ec635b74ca7

          SHA1

          a1ba579c8a24bdaede6eddcb7db892fd7852ba79

          SHA256

          78c3f67c3294510a1a8ec701b72340d72a60eaf4228c6f9f1ce4b9f057a45b42

          SHA512

          acfadd1c3f15736da7a1ffecf348534601a03f27e676d04b67f05d7c390e1e6c085af80bc98f46badc9c73a872465275c69c03cb3eb4a4d1d15d8202f49222c5

        • C:\Users\Admin\AppData\Local\Temp\718.bat

          Filesize

          175B

          MD5

          043b4456955836911ab7b4ebf8fb51d0

          SHA1

          be08532c0867538dc7e29354548256e2b54109cb

          SHA256

          4f822b55f65082b0a477b0a39ccf9beb7034c93c61afd40d0c09c34e4da11db5

          SHA512

          8b348a4299274e82546613e5649186ffba93611d9b7e64d4a2231ac269b68ad4faabbfb2a200110c67e9ee91bbf6afc6d52223a189307498bbd7c0b951937781

        • memory/3432-0-0x0000000000400000-0x000000000054F000-memory.dmp

          Filesize

          1.3MB

        • memory/3432-1-0x0000000000400000-0x000000000054F000-memory.dmp

          Filesize

          1.3MB

        • memory/3432-2-0x0000000000400000-0x000000000054F000-memory.dmp

          Filesize

          1.3MB

        • memory/3432-8-0x0000000000400000-0x000000000054F000-memory.dmp

          Filesize

          1.3MB