Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 13:31

General

  • Target

    b7d3aedfcd7e5918389b2ae3e18107f7_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    b7d3aedfcd7e5918389b2ae3e18107f7

  • SHA1

    337488ca1541fc1eae8f5429a915c54336cffccc

  • SHA256

    5004dc6bc616c464084869643717c796c351cd8106430225d14ac2eaf379cd70

  • SHA512

    150c0c98d60a947d26b2a8d997c9e2c889884fb83ee7b6e4454c448b74c1e903f01730172d67280a8026719aed58abe87531d14a49df7c3eb8b41299beb4babd

  • SSDEEP

    24576:mI0lusKkyGo7m6c7Ge7ZPxO0bHABH4az9LRsxdattQechIIwJpEI1:wX87an7ZPxO0bHABYaz9LRsitQeC7wb

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7d3aedfcd7e5918389b2ae3e18107f7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b7d3aedfcd7e5918389b2ae3e18107f7_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1540
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4172,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:8
    1⤵
      PID:4020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ish240658828\bootstrap_9194.html

      Filesize

      156B

      MD5

      1ea9e5b417811379e874ad4870d5c51a

      SHA1

      a4bd01f828454f3619a815dbe5423b181ec4051c

      SHA256

      f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a

      SHA512

      965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa

    • C:\Users\Admin\AppData\Local\Temp\ish240658828\css\buttons.css

      Filesize

      1KB

      MD5

      63e5607b6ca179f4022438b4c1ebb8cd

      SHA1

      3a51b4c95b4210058242ec0f3025cc28cec16cf6

      SHA256

      86c77fbf9666fae956c11a2711fe2596a03443aeb935bdc430509741cf43e530

      SHA512

      47d51c36a0482c0359282a9c42c3f3380fbcdbd4ce904b0bd3edcd43cbcbf4e694e6ae4ed513f4aabb4d21063bb7e54fbc1953874bd18cde2aec5477f80da502

    • C:\Users\Admin\AppData\Local\Temp\ish240658828\css\main.css

      Filesize

      3KB

      MD5

      98f9b28b30fbfa06b35e880caec410f5

      SHA1

      b9c5ebca5f9b4fd1a02b40be1d89561b0bda1c76

      SHA256

      0aa4af275722cf97ac03536dd5296c0999e34d31ba82a5bf8c4fe5aec57a8f02

      SHA512

      039c38574348b914a18918a445a0be8c03d7f1d02fa23a12d04c735e1694d46ccadf955d07f82fece33ec744aad464e9ca448c363c454d929e263458b135482a

    • C:\Users\Admin\AppData\Local\Temp\ish240658828\css\sdk-ui\progress-bar.css

      Filesize

      458B

      MD5

      f047788b88f4dace0e828635437e565f

      SHA1

      159d7a6b7563e4e4756796a83a4c019b3862d86d

      SHA256

      2264c4f20115e93ea2d609e7bc088cb82f0947bc41e65c6cf546e2cabf5f48d7

      SHA512

      a61be4cbeb5ce48263b60d75a07c4614973203b76918d0489f31dd147c8b1a57340189f12a92b98b2ab7365849b12d31f694a6931c90b55b8a336a5990a34790

    • C:\Users\Admin\AppData\Local\Temp\ish240658828\images\back.png

      Filesize

      991B

      MD5

      8a99e16e48ab5bfd0084ccd49281b036

      SHA1

      ab40545bb33ab2bad0891d3b71c3f618a916cb1d

      SHA256

      e44a2c233a1b29a6cb3bdd5955dece4ddd1e7497d3529bb55add8da124ad3fef

      SHA512

      f8b5fd65300cfd1f7554e381d0a3313ce8611aa092b44322c1b59ebc145e915707825f0fcf8e2e979ef6464df713db4d3897f4624f5ab9d777d4f8c4c5ef95cb

    • C:\Users\Admin\AppData\Local\Temp\ish240658828\images\bg.png

      Filesize

      63KB

      MD5

      674ebeb11c056b0cdf01802020b8b41a

      SHA1

      16fba8a46be739be737fcce768021a83142dc7eb

      SHA256

      b2f6875b12c8d4d583f93380c34babc18bb027cb15ed4e8a39bfbb5d9848f0b7

      SHA512

      71a826aca996b7db61a23e3011d4b3d9e61469f82620e6c0b08b1c85492d81da0d151d4c9aac6b3c168b53f0e4314bc2af6d5949c1e579f062f2697ae86be40b

    • C:\Users\Admin\AppData\Local\Temp\ish240658828\images\close.png

      Filesize

      1KB

      MD5

      60e7a3f760637dd125a1150474e7f6bb

      SHA1

      46e4b53480dd7b3db532e3511a7ad3b9e99b2f48

      SHA256

      d244e6d623fb3706340ead5491bb61663e5d53a3f7d96d4b613175c875c42184

      SHA512

      d279b197d330c4fe7de5e891b45e60273b603d58c84a502461ba2edf008ed51e6bcfd8768a74ee95bc9558bcbe8294f9f759c188327f7c54b1483d1072b32268

    • C:\Users\Admin\AppData\Local\Temp\ish240658828\images\icon.png

      Filesize

      5KB

      MD5

      45d8e7f1e721db59eca3dc36e932bf8b

      SHA1

      974fbb730c8c1ae66c6187f99d887f44d8a77a56

      SHA256

      f8cfaea0b23c976a4e7a67ffe79dd82210c5fea7d6eba2383a3cc33f8802ae05

      SHA512

      85b671dc81758977e5f807af91333573e1733ce8ca6721100dbe8538a481d8811d6d36754517948ff6a5ad984bb5ed0724790f43ba30dafdafb8c94735e249bc

    • C:\Users\Admin\AppData\Local\Temp\ish240658828\images\next.png

      Filesize

      1KB

      MD5

      a4987c1267f6e8361800aa3d2dc840a2

      SHA1

      6d428d5e9333f78ffb65f8ac3aab06c8915078a3

      SHA256

      1b7fffc6ecbde629472f7e1b534243f7f7da06a6f2fed082cf1c62b6b002e9d5

      SHA512

      5fc4a1619851dddb8e689cbb342570f3004a7e4c030c593ac361b55584cda6178b3ce6a4baeed810467e569c07587affde5180420d793eb380782f440b23660a

    • memory/1540-125-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-132-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-124-0x0000000000401000-0x00000000004C6000-memory.dmp

      Filesize

      788KB

    • memory/1540-0-0x0000000000401000-0x00000000004C6000-memory.dmp

      Filesize

      788KB

    • memory/1540-126-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-127-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-128-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-129-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-130-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-1-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-133-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-134-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-135-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-136-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-137-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-138-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-139-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/1540-140-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB