Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 20:12
Behavioral task
behavioral1
Sample
b4de73b92b8ede680d8f1c4fb44c386e_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
b4de73b92b8ede680d8f1c4fb44c386e_JaffaCakes118.exe
-
Size
386KB
-
MD5
b4de73b92b8ede680d8f1c4fb44c386e
-
SHA1
3fcf79976e3b7fa5e5a815db4f36ccc8bae8fb92
-
SHA256
5f2de26098590e3d88df54961d44d6e1c51d65aef78f487fbf41ac0b4f7210a7
-
SHA512
ab67e8e5a33a03a30c2bf528afc33993c97248d3cc1a81b7cc81e7087b5d059c77159559c975bd3166a26ee399b6ca8fb0eb27b3fec3724bdb2cab0a24b3e039
-
SSDEEP
12288:h9xZ5yN3Cwaw//ikDju436I26h+OoS9Ot6:h9vsky/7NKDm+16
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2472-0-0x00000000001F0000-0x000000000033F000-memory.dmp upx behavioral1/memory/2472-1-0x00000000001F0000-0x000000000033F000-memory.dmp upx behavioral1/files/0x0035000000016328-11.dat upx behavioral1/memory/2472-13-0x00000000001F0000-0x000000000033F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4de73b92b8ede680d8f1c4fb44c386e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2992 2472 b4de73b92b8ede680d8f1c4fb44c386e_JaffaCakes118.exe 30 PID 2472 wrote to memory of 2992 2472 b4de73b92b8ede680d8f1c4fb44c386e_JaffaCakes118.exe 30 PID 2472 wrote to memory of 2992 2472 b4de73b92b8ede680d8f1c4fb44c386e_JaffaCakes118.exe 30 PID 2472 wrote to memory of 2992 2472 b4de73b92b8ede680d8f1c4fb44c386e_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4de73b92b8ede680d8f1c4fb44c386e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4de73b92b8ede680d8f1c4fb44c386e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\990.bat2⤵
- System Location Discovery: System Language Discovery
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD5b4de73b92b8ede680d8f1c4fb44c386e
SHA13fcf79976e3b7fa5e5a815db4f36ccc8bae8fb92
SHA2565f2de26098590e3d88df54961d44d6e1c51d65aef78f487fbf41ac0b4f7210a7
SHA512ab67e8e5a33a03a30c2bf528afc33993c97248d3cc1a81b7cc81e7087b5d059c77159559c975bd3166a26ee399b6ca8fb0eb27b3fec3724bdb2cab0a24b3e039
-
Filesize
177B
MD5890bc470210e33da77f5cec099e498ea
SHA111655c1366b4a64d1a19ee38ad769ba308bfe6d1
SHA256594ea564eb1af5586ad5479907d63ba0d74004368bfec9204f33ffe0377affa2
SHA5121ab7a8e849cc3476771ab6fc2c2826e9fc13735e052f2e289f4a01124f86a1bb7a42627a1abad7a5153fc80ee2e19ab41f7a25b07751873bf50e8ab9d1fd91b4