Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe
-
Size
216KB
-
MD5
b35cbecd541ee0a6084bf77d5ccfb7c0
-
SHA1
7eea782353b9f310240a397f6662c073a4192147
-
SHA256
739f5033de9c24e0eac42a1145c4a7e3a0f00d68fa9a64d578df86b767116fe0
-
SHA512
1acd55ec774b515c08d8909e8a517a527976f126de57804beb332fbf63ba13dbb43c4a2ae095aa108da9f250333147f802851132cb13bb8bf01f27450c28eb6d
-
SSDEEP
6144:eqYuCNcXK4W/UhPcFG6UyhbX4tjRuV8TFJZwc:eqYAa4W/UhPeGiVyzRJZwc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2708 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 976 wrote to memory of 2708 976 b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe 29 PID 976 wrote to memory of 2708 976 b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe 29 PID 976 wrote to memory of 2708 976 b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe 29 PID 976 wrote to memory of 2708 976 b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe 29 PID 2708 wrote to memory of 3036 2708 cmd.exe 31 PID 2708 wrote to memory of 3036 2708 cmd.exe 31 PID 2708 wrote to memory of 3036 2708 cmd.exe 31 PID 2708 wrote to memory of 3036 2708 cmd.exe 31 PID 2708 wrote to memory of 2524 2708 cmd.exe 32 PID 2708 wrote to memory of 2524 2708 cmd.exe 32 PID 2708 wrote to memory of 2524 2708 cmd.exe 32 PID 2708 wrote to memory of 2524 2708 cmd.exe 32 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3036 attrib.exe 2524 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\UserData\F7A8TM~1.BAT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Local\Temp\b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3036
-
-
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\UserData\F7A8.tmp.bat"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2524
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520B
MD5c063bb3a593a96398b1c6c5893fd1e60
SHA16eb38553a9b295e17a3178b99971067eb36980c5
SHA2567701c910ce18aabb8822453083103307f491ba7a555a778b351d304d176996aa
SHA5125b49138f549b127f473c4d3733d6d79cfd5ad60f6a87e2eabdf9fee1b2e3f4945c32aab74fef50e6c15dd0feed0f351488061746fc855c59c4386bc9ddd1d1e6