Analysis
-
max time kernel
141s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe
-
Size
166KB
-
MD5
b8be94eb7b9aa8b468051af5879bdf27
-
SHA1
f178d4b7c6759606b8ea2425866145c9a1aaa657
-
SHA256
2d0631885a6107a4e4d3043a4510a792c8dffd44d694d391fbd6b16ba6c9f4d9
-
SHA512
0ce8fc5e04af94bcf1273be9970fcf5c73a1537440d6a2941629af837b149e7c1373f66d840b58e4dbdf40c969e85e4d7126d6bf28bf7b917877acf675230328
-
SSDEEP
3072:jtGqRRuT30UGeSgItLM3oNG2+o78g8ze8grXqz8mIMAJDYlIyYBoXFBkm:QqRRuT30HtAYNv9Yg8zdz8mcJD+IFBoZ
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2548-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2288-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2288-14-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2548-16-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2264-84-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2264-83-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2264-81-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2548-85-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2548-197-0x0000000000400000-0x0000000000445000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2288 2548 b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2288 2548 b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2288 2548 b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2288 2548 b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2264 2548 b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe 31 PID 2548 wrote to memory of 2264 2548 b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe 31 PID 2548 wrote to memory of 2264 2548 b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe 31 PID 2548 wrote to memory of 2264 2548 b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b8be94eb7b9aa8b468051af5879bdf27_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d2a5ec24b5f218ecb6f1a28200110e0d
SHA144bdd86aab370caca3c16c5a9d7431db1bbeff3b
SHA2565f54fe88a1ccd6beac583fe6ba4c3a04f6bf44c723c13c28487c1c38a3b05ce7
SHA5121922a7fdcc301774644ee3bad661f2c875f8e12a468898291cab8099907ada9af72c9190187ed27d16f6abb263605aa7dc457580c01051e5eb947eb554e77785
-
Filesize
600B
MD5f00c0214a80ebe62836bf3b362eedd60
SHA1669ce36640d241465bbdaadb3f719b00db6acb56
SHA25674e077328ab0d31d857733564a0c5e45cdb9c86390642fc9bb11d22c4809db19
SHA512cbaf270675e16f22de28cb39c80097544bd61417f58426266e43222605d46626057b361e502dc1f7fda1a9a3e775f6a42e22a01bbfcc5f7869c92d33146defd3
-
Filesize
996B
MD5932dca0a0d003fb233fe73cbfbbcf68d
SHA1cbea2197207ab281f05b5c0ae3adb7b5fbeb9fcc
SHA256a728b8200d1b7d3bfa926c3f3fefbde734cf6eb8ec96f9e7303e6cee15d9d493
SHA51289b76fef4cfa72262dac0cd7c76b7d4c0b8cd0c609a48ef3731b27d550dba175a5eab0e13d541245c1175a71b1748766684128014f1e67ed4d879eb4345dfd64