Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 11:55
Static task
static1
Behavioral task
behavioral1
Sample
b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe
-
Size
216KB
-
MD5
b35cbecd541ee0a6084bf77d5ccfb7c0
-
SHA1
7eea782353b9f310240a397f6662c073a4192147
-
SHA256
739f5033de9c24e0eac42a1145c4a7e3a0f00d68fa9a64d578df86b767116fe0
-
SHA512
1acd55ec774b515c08d8909e8a517a527976f126de57804beb332fbf63ba13dbb43c4a2ae095aa108da9f250333147f802851132cb13bb8bf01f27450c28eb6d
-
SSDEEP
6144:eqYuCNcXK4W/UhPcFG6UyhbX4tjRuV8TFJZwc:eqYAa4W/UhPeGiVyzRJZwc
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3272 wrote to memory of 2012 3272 b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe 94 PID 3272 wrote to memory of 2012 3272 b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe 94 PID 3272 wrote to memory of 2012 3272 b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe 94 PID 2012 wrote to memory of 4020 2012 cmd.exe 96 PID 2012 wrote to memory of 4020 2012 cmd.exe 96 PID 2012 wrote to memory of 4020 2012 cmd.exe 96 PID 2012 wrote to memory of 2636 2012 cmd.exe 97 PID 2012 wrote to memory of 2636 2012 cmd.exe 97 PID 2012 wrote to memory of 2636 2012 cmd.exe 97 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4020 attrib.exe 2636 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\MICROS~1\TEMPLA~1\LIVECO~1\16\Managed\SMARTA~1\4FFFTM~1.BAT2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Local\Temp\b35cbecd541ee0a6084bf77d5ccfb7c0_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4020
-
-
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\SmartArt Graphics\4FFF.tmp.bat"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2636
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4308,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=3964 /prefetch:81⤵PID:4148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
568B
MD5264ccf0fef439ccd2aa33f015ad26443
SHA132045a7da0f8c804be28455982870dbb901554c5
SHA256f7c1268bb275321d8ddd1e3defdcd0128bb8a3d32eda5fc09eb242adf72f50ba
SHA51287110c18786d796bc19b5e6329db5407d165a6ff992e48c1c457772b08ec2283bf10ee94949ab0b89e1555211ec5a8a2025e9575f0ef0933c67552cb3d83efbb