Analysis
-
max time kernel
139s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 02:23
Behavioral task
behavioral1
Sample
b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe
-
Size
31KB
-
MD5
b5fd28d918dd8fba316b82da13956d9b
-
SHA1
20b16e0a77b748d13d535c0ce148e02b0b12ffbe
-
SHA256
80aea25afeadc04398b113cec5781bb5e60ca532b4b71f4c51817ba84d954cdf
-
SHA512
61e8bf172698969691481ca4b64a3a16cfb91756b9d7e54b8d507f244782d498b188fda3e80ab1520c21223a323121051e2bf3e3a75945c566fb0233e5d89ac1
-
SSDEEP
768:sJxzV8eYPtBP68HEu7eGslwhMKpjgeebZx:2ild6mgeSH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3884 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3884 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/984-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/984-3-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/984-9-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 2784 984 WerFault.exe 90 4368 984 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 984 b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe 984 b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe 984 b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe 984 b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe 3884 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 984 b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe 984 b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 984 wrote to memory of 3884 984 b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe 104 PID 984 wrote to memory of 3884 984 b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe 104 PID 984 wrote to memory of 3884 984 b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b5fd28d918dd8fba316b82da13956d9b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\CxF7XXmIddyyeFUy.dat, ServerMain 1c:\users\admin\appdata\local\temp\b5fd28d918dd8fba316b82da13956d9b_jaffacakes118.exe2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 984 -s 2642⤵
- Program crash
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 984 -s 2122⤵
- Program crash
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=2708,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=3840 /prefetch:81⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 984 -ip 9841⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 984 -ip 9841⤵PID:780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5330e2f3770a7a6ea1add114ccd617de1
SHA13da2def3141a51fd03261ae12cbd5450aec0a491
SHA25603d69e08c7f3e1fe5535921010b9b1414e77023bc76f98e58a5df2bee9eee5e0
SHA512bed5c70750cf19d4692deb788b19b2041dad83b4257b04bc4cad9e50829c5da333809bdd604406de645da2e58cc891cdbe8a4a44fff2f5a1b34d6673f7b3d714