Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 07:46

General

  • Target

    bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe

  • Size

    185KB

  • MD5

    bae3318f4755a06022d4f28f46878794

  • SHA1

    d2daff850f93a5495436768e8f333f60727fe641

  • SHA256

    8cb7febbf0ca9f33304fa10eb529f7fd7a6105b4fa6af676aa0e2138c10a8068

  • SHA512

    5f71775658eb7d5d0d21c1b3c222e958b96cd5d553328737f87a7d243c2b95a493a7566ca9dd81ed623a62fbb14e7ebf90678fb7c9720cc4d2ff2a6851fbbbc3

  • SSDEEP

    3072:4NAvjiyMk96bj+ReNPpD8O5oo+g9hPp0dMqHdl7lmk/AqFYGfLGOvv1Q6hfN:4NAvjiyr9EUeNPhooz9hHqLh//vSoHQy

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2404
    • C:\Users\Admin\AppData\Local\Temp\bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\E975.3B3

    Filesize

    1KB

    MD5

    163b50e0cc8370b6a3b7eda7c4e0e9d5

    SHA1

    25c07473c7e9e354d54429f56a72b519730a09dc

    SHA256

    77384d985ee1447caab5b70c67bca2d0f8fa44ae721bf63d5341d496e5b45593

    SHA512

    7577f1abc32d84d2dbab0003db4ea8b8f5324f1df8c4606f84f1930552af5d726236693fc0052ea8f4cb3c8ca6c979afbddecf7dda6786ef2f1fadd9f812c691

  • C:\Users\Admin\AppData\Roaming\E975.3B3

    Filesize

    600B

    MD5

    b10466a747e127d81eb965af64febe7d

    SHA1

    de56d237cd2043487eca2e386031d9240234f012

    SHA256

    5669956a7c5e74f6218cef85403871651100c8326221cddf6ccc1ca380e94fc0

    SHA512

    b98b4003db44e9c7adafa21ff4d0937fcce36863154f7d5dfb5a58eb1fa006c4f644260e25d014403e13bd6477711534eed620318d670936dc2fbad1d6880db8

  • C:\Users\Admin\AppData\Roaming\E975.3B3

    Filesize

    996B

    MD5

    a8b264fa1bff4286ad8518fa99f8ce76

    SHA1

    bc8cf9a31a167b0b29f99f1686b1b390fd495d1c

    SHA256

    c02cdb2fbc7407db191ef45d90461e9ce0ba2f8b61dd6983b6370a4c62c3361d

    SHA512

    70f2e3d8529a8897965c715ba33ba7a64391e703f2b02d894f82db66991dad6dd61ec8a3acd663913e325874f445c2211c455d2c69ceb539cce21dcacaeb0194

  • memory/2084-1-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2084-2-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2084-15-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2084-77-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2084-168-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2404-5-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2404-7-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2868-75-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2868-76-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB