Analysis
-
max time kernel
138s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
ba7e930b881802426130091e9e2bb47b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ba7e930b881802426130091e9e2bb47b_JaffaCakes118.exe
-
Size
63KB
-
MD5
ba7e930b881802426130091e9e2bb47b
-
SHA1
0168435f862d6a83f90c596c66e682b3df47d82c
-
SHA256
6cdbd15cbc340af22cc896d0dc657e5785f2a94c0100884f1fbde99da262d080
-
SHA512
e4e213e4ac5ba3e6fcc60924fc679a90522c7a3b9ae0efa85b9068937df9ad97f9ad01f5e455c41d8c0065e10f912e1a4bb67f60578fa002d1f9f152caed5338
-
SSDEEP
768:15eSeLnPvcjG1af/m612G0BJXIQ9E40QgnfseaYbj9f7XTQ94gXh:15lwvqcaf/m9JYLnfH5bjZLTQqUh
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 24 discord.com 25 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba7e930b881802426130091e9e2bb47b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3900 ba7e930b881802426130091e9e2bb47b_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3900 ba7e930b881802426130091e9e2bb47b_JaffaCakes118.exe